Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NZZ71x6Cyz.dll

Overview

General Information

Sample name:NZZ71x6Cyz.dll
renamed because original name is a hash value
Original sample name:6350f8da991da9ee85c63e15cce88fbb.dll
Analysis ID:1591812
MD5:6350f8da991da9ee85c63e15cce88fbb
SHA1:7380fd83ad6371438e1a8356a0c62cf4ca378e91
SHA256:6af42a9026223db1b3a0a5ebb788d8935dabfd9dfe34093957b739cb531619a0
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2120 cmdline: loaddll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5204 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4568 cmdline: rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7148 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1766D9D4769580C0FAB9E6AD5BF73436)
          • tasksche.exe (PID: 5752 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 747CD55009BDBB466A01BD7214FCE79D)
    • rundll32.exe (PID: 3300 cmdline: rundll32.exe C:\Users\user\Desktop\NZZ71x6Cyz.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5784 cmdline: rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 5936 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1766D9D4769580C0FAB9E6AD5BF73436)
        • tasksche.exe (PID: 5756 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 747CD55009BDBB466A01BD7214FCE79D)
  • mssecsvc.exe (PID: 2976 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 1766D9D4769580C0FAB9E6AD5BF73436)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
NZZ71x6Cyz.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    NZZ71x6Cyz.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    NZZ71x6Cyz.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0000000C.00000000.2267479178.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000008.00000000.2246993407.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000009.00000000.2256769702.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            0000000B.00000000.2260476677.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.24e68c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              6.0.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                6.0.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                6.0.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                6.0.mssecsvc.exe.7100a4.1.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
                • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
                • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
                Click to see the 135 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:15.345942+010020315153Misc activity104.16.167.22880192.168.2.649734TCP
                2025-01-15T14:06:16.449130+010020315153Misc activity104.16.167.22880192.168.2.649743TCP
                2025-01-15T14:06:17.527728+010020315153Misc activity104.16.167.22880192.168.2.649765TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:14.822203+010020242911A Network Trojan was detected192.168.2.6557711.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:15.344838+010020242981A Network Trojan was detected192.168.2.649734104.16.167.22880TCP
                2025-01-15T14:06:16.448448+010020242981A Network Trojan was detected192.168.2.649743104.16.167.22880TCP
                2025-01-15T14:06:17.526731+010020242981A Network Trojan was detected192.168.2.649765104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:15.344838+010020242991A Network Trojan was detected192.168.2.649734104.16.167.22880TCP
                2025-01-15T14:06:16.448448+010020242991A Network Trojan was detected192.168.2.649743104.16.167.22880TCP
                2025-01-15T14:06:17.526731+010020242991A Network Trojan was detected192.168.2.649765104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:15.344838+010020243011A Network Trojan was detected192.168.2.649734104.16.167.22880TCP
                2025-01-15T14:06:16.448448+010020243011A Network Trojan was detected192.168.2.649743104.16.167.22880TCP
                2025-01-15T14:06:17.526731+010020243011A Network Trojan was detected192.168.2.649765104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:15.344838+010020243021A Network Trojan was detected192.168.2.649734104.16.167.22880TCP
                2025-01-15T14:06:16.448448+010020243021A Network Trojan was detected192.168.2.649743104.16.167.22880TCP
                2025-01-15T14:06:17.526731+010020243021A Network Trojan was detected192.168.2.649765104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T14:06:15.344838+010028033043Unknown Traffic192.168.2.649734104.16.167.22880TCP
                2025-01-15T14:06:16.448448+010028033043Unknown Traffic192.168.2.649743104.16.167.22880TCP
                2025-01-15T14:06:17.526731+010028033043Unknown Traffic192.168.2.649765104.16.167.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: NZZ71x6Cyz.dllAvira: detected
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 95%
                Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 96%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 95%
                Source: NZZ71x6Cyz.dllVirustotal: Detection: 90%Perma Link
                Source: NZZ71x6Cyz.dllReversingLabs: Detection: 94%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                Source: NZZ71x6Cyz.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: NZZ71x6Cyz.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49711 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49934 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50241 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50366 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50621 version: TLS 1.2

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49765 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49765 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49765 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49765 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49734 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49734 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49734 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49734 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49743 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49743 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49743 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49743 -> 104.16.167.228:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 13:06:15 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902614fd7d0e32d0-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 13:06:16 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90261504493a0f4a-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 13:06:17 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9026150b2af118bc-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49765 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.6:55771 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.6:49765
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49734 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.6:49734
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49743 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.6:49743
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.129
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.129
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.129
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.129
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 113.215.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.92
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.92
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.92
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.92
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 190.117.95.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.84
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.84
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.84
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.84
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 206.46.140.1
                Source: unknownTCP traffic detected without corresponding DNS query: 194.169.32.174
                Source: unknownTCP traffic detected without corresponding DNS query: 194.169.32.174
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe, 00000008.00000002.2892599345.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2268731150.0000000000D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                Source: mssecsvc.exe, 00000008.00000002.2892599345.0000000000B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/0
                Source: mssecsvc.exe, 00000006.00000002.2258299628.0000000000C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/S
                Source: mssecsvc.exe, 0000000B.00000002.2268731150.0000000000D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/gs
                Source: mssecsvc.exe, 00000008.00000002.2892085258.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                Source: mssecsvc.exe, 0000000B.00000002.2268731150.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comr
                Source: mssecsvc.exe, 0000000B.00000002.2268731150.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50241
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50366
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50621
                Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 50366 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 50621 -> 443
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49711 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49934 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50241 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50366 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50621 version: TLS 1.2

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
                Source: Yara matchFile source: NZZ71x6Cyz.dll, type: SAMPLE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1fc6104.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.24e68c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.24f18e8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.24f5948.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1fc20a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000000.2246993407.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.2260476677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2268397761.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2232766109.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.2260317441.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2268262779.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893277136.00000000024F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.2247134068.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2232907236.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893040296.0000000001FC6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7148, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2976, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5936, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                System Summary

                barindex
                Source: NZZ71x6Cyz.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: NZZ71x6Cyz.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.24e68c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1fb7084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1fc6104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1fc6104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.24e68c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.24e68c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.24f18e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.24f18e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.24f5948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.24f5948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1fc20a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1fc20a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.2267479178.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.2256769702.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.2260476677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.2268397761.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.2267848816.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2893277136.00000000024F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.2247134068.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.2232907236.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2893040296.0000000001FC6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
                Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: NZZ71x6Cyz.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: NZZ71x6Cyz.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: NZZ71x6Cyz.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.24e68c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1fb7084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1fe9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.251896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.24f5948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1fc6104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.251896c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1fc6104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1fc6104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.24e68c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.24e68c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1fe9128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1fb7084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.24f18e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.24f18e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.24f5948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.24f5948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1fc20a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1fc20a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.2267479178.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.2256769702.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.2260476677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.2268397761.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.2267848816.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2893277136.00000000024F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.2247134068.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.2232907236.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2893040296.0000000001FC6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: tasksche.exe, 00000009.00000000.2256769702.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000000.2267479178.000000000040E000.00000008.00000001.01000000.00000007.sdmp, NZZ71x6Cyz.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3924:120:WilError_03
                Source: NZZ71x6Cyz.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\NZZ71x6Cyz.dll,PlayGame
                Source: NZZ71x6Cyz.dllVirustotal: Detection: 90%
                Source: NZZ71x6Cyz.dllReversingLabs: Detection: 94%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\NZZ71x6Cyz.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\NZZ71x6Cyz.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: NZZ71x6Cyz.dllStatic file information: File size 5267459 > 1048576
                Source: NZZ71x6Cyz.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 380Thread sleep count: 94 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 380Thread sleep time: -188000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6672Thread sleep count: 126 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6672Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 380Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 0000000B.00000002.2268731150.0000000000D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW88
                Source: mssecsvc.exe, 00000006.00000002.2258299628.0000000000CBF000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2892599345.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.2256102586.0000000000B6D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2892599345.0000000000B6D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2268731150.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvc.exe, 00000006.00000002.2258299628.0000000000C86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpS
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1Jump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media11
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS2
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591812 Sample: NZZ71x6Cyz.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 63 Tries to download HTTP data from a sinkholed server 2->63 65 Suricata IDS alerts for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 6 other signatures 2->69 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        49 192.168.2.102 unknown unknown 12->49 51 192.168.2.103 unknown unknown 12->51 53 98 other IPs or domains 12->53 79 Connects to many different private IPs via SMB (likely to spread or exploit) 12->79 81 Connects to many different private IPs (likely to spread or exploit) 12->81 signatures6 process7 file8 26 rundll32.exe 16->26         started        61 Drops executables to the windows directory (C:\Windows) and starts them 18->61 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 83 Drops executables to the windows directory (C:\Windows) and starts them 28->83 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 55 Antivirus detection for dropped file 32->55 57 Multi AV Scanner detection for dropped file 32->57 59 Machine Learning detection for dropped file 32->59 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 71 Detected Wannacry Ransomware 38->71 73 Antivirus detection for dropped file 38->73 75 Multi AV Scanner detection for dropped file 38->75 77 Machine Learning detection for dropped file 38->77

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                NZZ71x6Cyz.dll90%VirustotalBrowse
                NZZ71x6Cyz.dll95%ReversingLabsWin32.Ransomware.WannaCry
                NZZ71x6Cyz.dll100%AviraTR/Ransom.Gen
                NZZ71x6Cyz.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)95%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\mssecsvc.exe97%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe95%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comr0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                104.16.167.228
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.4.drfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Smssecsvc.exe, 00000006.00000002.2258299628.0000000000C9E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.kryptoslogic.commssecsvc.exe, 0000000B.00000002.2268731150.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/0mssecsvc.exe, 00000008.00000002.2892599345.0000000000B37000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/gsmssecsvc.exe, 0000000B.00000002.2268731150.0000000000D6F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comrmssecsvc.exe, 0000000B.00000002.2268731150.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2892085258.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  223.166.26.1
                                  unknownChina
                                  17621CNCGROUP-SHChinaUnicomShanghainetworkCNfalse
                                  72.185.209.1
                                  unknownUnited States
                                  33363BHN-33363USfalse
                                  164.178.44.2
                                  unknownCanada
                                  37717EL-KhawarizmiTNfalse
                                  164.178.44.1
                                  unknownCanada
                                  37717EL-KhawarizmiTNfalse
                                  147.169.12.41
                                  unknownUnited States
                                  1474DNIC-ASBLK-01474-01477USfalse
                                  211.202.36.1
                                  unknownKorea Republic of
                                  9318SKB-ASSKBroadbandCoLtdKRfalse
                                  116.147.245.117
                                  unknownChina
                                  4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                  197.241.66.1
                                  unknownDjibouti
                                  30990ADJIB-ASDJfalse
                                  190.193.78.139
                                  unknownArgentina
                                  10481TelecomArgentinaSAARfalse
                                  3.102.3.252
                                  unknownUnited States
                                  16509AMAZON-02USfalse
                                  211.202.36.12
                                  unknownKorea Republic of
                                  9318SKB-ASSKBroadbandCoLtdKRfalse
                                  183.16.117.1
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  202.206.2.1
                                  unknownChina
                                  4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                  202.206.2.7
                                  unknownChina
                                  4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                  116.147.245.1
                                  unknownChina
                                  4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                  194.169.32.2
                                  unknownUnited Kingdom
                                  8190MDNXGBfalse
                                  194.169.32.1
                                  unknownUnited Kingdom
                                  8190MDNXGBfalse
                                  221.220.9.1
                                  unknownChina
                                  4808CHINA169-BJChinaUnicomBeijingProvinceNetworkCNfalse
                                  4.103.143.1
                                  unknownUnited States
                                  3356LEVEL3USfalse
                                  101.126.241.1
                                  unknownChina
                                  131486JDCOMBeijingJingdong360DegreeE-commerceCoLtdCNfalse
                                  101.126.241.145
                                  unknownChina
                                  131486JDCOMBeijingJingdong360DegreeE-commerceCoLtdCNfalse
                                  183.16.117.114
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  221.220.9.71
                                  unknownChina
                                  4808CHINA169-BJChinaUnicomBeijingProvinceNetworkCNfalse
                                  4.103.143.154
                                  unknownUnited States
                                  3356LEVEL3USfalse
                                  223.166.26.70
                                  unknownChina
                                  17621CNCGROUP-SHChinaUnicomShanghainetworkCNfalse
                                  178.115.204.122
                                  unknownAustria
                                  25255H3G-AUSTRIA-ASTELE2AUSTRIAATfalse
                                  190.193.78.2
                                  unknownArgentina
                                  10481TelecomArgentinaSAARfalse
                                  190.193.78.1
                                  unknownArgentina
                                  10481TelecomArgentinaSAARfalse
                                  IP
                                  192.168.2.148
                                  192.168.2.149
                                  192.168.2.146
                                  192.168.2.147
                                  192.168.2.140
                                  192.168.2.141
                                  192.168.2.144
                                  192.168.2.145
                                  192.168.2.142
                                  192.168.2.143
                                  192.168.2.159
                                  192.168.2.157
                                  192.168.2.158
                                  192.168.2.151
                                  192.168.2.152
                                  192.168.2.150
                                  192.168.2.155
                                  192.168.2.156
                                  192.168.2.153
                                  192.168.2.154
                                  192.168.2.126
                                  192.168.2.247
                                  192.168.2.127
                                  192.168.2.248
                                  192.168.2.124
                                  192.168.2.245
                                  192.168.2.125
                                  192.168.2.246
                                  192.168.2.128
                                  192.168.2.249
                                  192.168.2.129
                                  192.168.2.240
                                  192.168.2.122
                                  192.168.2.243
                                  192.168.2.123
                                  192.168.2.244
                                  192.168.2.120
                                  192.168.2.241
                                  192.168.2.121
                                  192.168.2.242
                                  192.168.2.97
                                  192.168.2.137
                                  192.168.2.96
                                  192.168.2.138
                                  192.168.2.99
                                  192.168.2.135
                                  192.168.2.98
                                  192.168.2.136
                                  192.168.2.139
                                  192.168.2.250
                                  192.168.2.130
                                  192.168.2.251
                                  192.168.2.91
                                  192.168.2.90
                                  192.168.2.93
                                  192.168.2.133
                                  192.168.2.254
                                  192.168.2.92
                                  192.168.2.134
                                  192.168.2.95
                                  192.168.2.131
                                  192.168.2.252
                                  192.168.2.94
                                  192.168.2.132
                                  192.168.2.253
                                  192.168.2.104
                                  192.168.2.225
                                  192.168.2.105
                                  192.168.2.226
                                  192.168.2.102
                                  192.168.2.223
                                  192.168.2.103
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1591812
                                  Start date and time:2025-01-15 14:05:11 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 37s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:15
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:NZZ71x6Cyz.dll
                                  renamed because original name is a hash value
                                  Original Sample Name:6350f8da991da9ee85c63e15cce88fbb.dll
                                  Detection:MAL
                                  Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .dll
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 2.23.77.188, 199.232.210.172, 13.107.246.45, 4.245.163.56, 172.202.163.200
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target tasksche.exe, PID 5752 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  08:06:16API Interceptor1x Sleep call for process: loaddll32.exe modified
                                  08:06:50API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  s-part-0017.t-0009.t-msedge.netbC61G18iPf.dllGet hashmaliciousWannacryBrowse
                                  • 13.107.246.45
                                  RFQ # PC25-1301.xlsxGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  RFQ # PC25-1301.xlsxGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  https://eventor.orienteering.asn.au/Home/RedirectToLivelox?redirectUrl=https%3A%2F%2Farchive1.diqx8fescpsb0.amplifyapp.com%2Fm1%2Fenvelope%2Fdocument%2Fcontent%2F4086Get hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  Setup_BrightSlide_1.0.9.exeGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  9179390927_20250115_155451.htmlGet hashmaliciousHTMLPhisherBrowse
                                  • 13.107.246.45
                                  https://www.pdfforge.org/pdfcreator?srsltid=AfmBOoq1lpA5qNxfcLUyxjmEXAioeKYtqPTpBsIbZ5VOdq3uhOg1WclGGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  0969686.vbeGet hashmaliciousAgentTeslaBrowse
                                  • 13.107.246.45
                                  Inquiry.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • 13.107.246.45
                                  http://jfdhq.offerpeercheck.comGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.combC61G18iPf.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  XB6SkLK7Al.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.166.228
                                  9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.166.228
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  EL-KhawarizmiTNsora.arm.elfGet hashmaliciousMiraiBrowse
                                  • 164.180.168.177
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 41.229.13.223
                                  Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                  • 164.182.99.67
                                  1.elfGet hashmaliciousUnknownBrowse
                                  • 41.229.13.239
                                  1.elfGet hashmaliciousUnknownBrowse
                                  • 41.229.13.214
                                  4.elfGet hashmaliciousUnknownBrowse
                                  • 41.229.6.114
                                  31.13.224.14-mips-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                                  • 164.180.121.195
                                  vcimanagement.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  • 41.229.13.236
                                  mips.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 164.189.48.180
                                  nsharm7.elfGet hashmaliciousMiraiBrowse
                                  • 164.183.197.64
                                  BHN-33363USm9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                  • 24.92.19.1
                                  x86.elfGet hashmaliciousUnknownBrowse
                                  • 72.187.197.225
                                  i486.elfGet hashmaliciousUnknownBrowse
                                  • 68.202.178.195
                                  meth9.elfGet hashmaliciousMiraiBrowse
                                  • 97.102.236.238
                                  meth15.elfGet hashmaliciousMiraiBrowse
                                  • 107.144.176.57
                                  https://tinyurl.com/ch268ddpGet hashmaliciousUnknownBrowse
                                  • 24.144.114.245
                                  res.sh4.elfGet hashmaliciousUnknownBrowse
                                  • 72.186.136.170
                                  4.elfGet hashmaliciousUnknownBrowse
                                  • 68.205.212.178
                                  frosty.spc.elfGet hashmaliciousMiraiBrowse
                                  • 24.73.129.68
                                  armv6l.elfGet hashmaliciousUnknownBrowse
                                  • 72.238.30.160
                                  CNCGROUP-SHChinaUnicomShanghainetworkCNspc.elfGet hashmaliciousUnknownBrowse
                                  • 139.227.209.159
                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 223.167.53.11
                                  5.elfGet hashmaliciousUnknownBrowse
                                  • 139.227.16.92
                                  frosty.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 58.246.27.186
                                  arm.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 139.227.28.72
                                  loligang.mips.elfGet hashmaliciousMiraiBrowse
                                  • 58.246.27.122
                                  m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 223.167.28.247
                                  armv6l.elfGet hashmaliciousUnknownBrowse
                                  • 220.252.245.196
                                  splppc.elfGet hashmaliciousUnknownBrowse
                                  • 220.196.166.46
                                  loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 139.226.219.238
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0eqqnal04.exeGet hashmaliciousPhemedrone StealerBrowse
                                  • 40.113.110.67
                                  RFQ_43200046412000086500125.vbsGet hashmaliciousDiscord Token StealerBrowse
                                  • 40.113.110.67
                                  0969686.vbeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  Inquiry.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • 40.113.110.67
                                  17369284269327933f4ce2d9485e98192cffc35d127e85bf0db77dc37ba595305760e31611471.dat-decoded.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • 40.113.110.67
                                  NEW SHIPPING DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 40.113.110.67
                                  new order.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 40.113.110.67
                                  No context
                                  Process:C:\Windows\mssecsvc.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3514368
                                  Entropy (8bit):5.807259103917498
                                  Encrypted:false
                                  SSDEEP:49152:nQqMSPbcBVqxJM0H9PAMEcaEau3R8yAH1plAHj:QqPoB8xWa9P593R8yAVp2Hj
                                  MD5:747CD55009BDBB466A01BD7214FCE79D
                                  SHA1:076D78AD4A0F38278E1D39566B9B66B3D2E493E3
                                  SHA-256:BCF1BA6140B7BA6F0930780CAD1D60AC0751BF9C60E55F13A09F92C1AE9EA5E6
                                  SHA-512:4AE1755CE0A248F60855F7CBB40E70250ED42FE0795E4B60C45158319127AABD4FE4D5CB7B82E0F85F8B5734183437203DD9E26CED6150B2115904CDFED4154A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\rundll32.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3723264
                                  Entropy (8bit):5.860613068024677
                                  Encrypted:false
                                  SSDEEP:49152:XnAQqMSPbcBVqxJM0H9PAMEcaEau3R8yAH1plAHI:XDqPoB8xWa9P593R8yAVp2HI
                                  MD5:1766D9D4769580C0FAB9E6AD5BF73436
                                  SHA1:02ECA9F1966819D63D82D62A94C8AF3E76041411
                                  SHA-256:FA97BAAA08D04807E478688A133076A109A7578C7B4D9BE15E96B4DE8522807D
                                  SHA-512:41E36B6A7E0BA4783CD90039CFF5E87743CCA2E8DEEE63B62CC0DCB8BAB459F1D7919F59275CC266EF1519942AD2386C16791BD9706EE06EB4658F3F86018F50
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 97%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\mssecsvc.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3514368
                                  Entropy (8bit):5.807259103917498
                                  Encrypted:false
                                  SSDEEP:49152:nQqMSPbcBVqxJM0H9PAMEcaEau3R8yAH1plAHj:QqPoB8xWa9P593R8yAVp2Hj
                                  MD5:747CD55009BDBB466A01BD7214FCE79D
                                  SHA1:076D78AD4A0F38278E1D39566B9B66B3D2E493E3
                                  SHA-256:BCF1BA6140B7BA6F0930780CAD1D60AC0751BF9C60E55F13A09F92C1AE9EA5E6
                                  SHA-512:4AE1755CE0A248F60855F7CBB40E70250ED42FE0795E4B60C45158319127AABD4FE4D5CB7B82E0F85F8B5734183437203DD9E26CED6150B2115904CDFED4154A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):4.45097282302188
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                  • DOS Executable Generic (2002/1) 0.20%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:NZZ71x6Cyz.dll
                                  File size:5'267'459 bytes
                                  MD5:6350f8da991da9ee85c63e15cce88fbb
                                  SHA1:7380fd83ad6371438e1a8356a0c62cf4ca378e91
                                  SHA256:6af42a9026223db1b3a0a5ebb788d8935dabfd9dfe34093957b739cb531619a0
                                  SHA512:9e0eb43bac2b4245a6daa369564e58ae804b4a234a3782b5f0e6bb7034a46c2147e2d83a046ce9907c30b8ea579f32987aa9e851e3a2ca7f43461cc09012f8fe
                                  SSDEEP:49152:znAQqMSPbcBVqxJM0H9PAMEcaEau3R8yAH1plAH:TDqPoB8xWa9P593R8yAVp2H
                                  TLSH:773633A0A75C71BCF0A507709033493DBBBB3C69A33A8B1F97C487560D137966EA8B45
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                  Icon Hash:7ae282899bbab082
                                  Entrypoint:0x100011e9
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x10000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                  DLL Characteristics:
                                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push ebx
                                  mov ebx, dword ptr [ebp+08h]
                                  push esi
                                  mov esi, dword ptr [ebp+0Ch]
                                  push edi
                                  mov edi, dword ptr [ebp+10h]
                                  test esi, esi
                                  jne 00007F608CFF042Bh
                                  cmp dword ptr [10003140h], 00000000h
                                  jmp 00007F608CFF0448h
                                  cmp esi, 01h
                                  je 00007F608CFF0427h
                                  cmp esi, 02h
                                  jne 00007F608CFF0444h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007F608CFF042Bh
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  test eax, eax
                                  je 00007F608CFF042Eh
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F608CFF033Ah
                                  test eax, eax
                                  jne 00007F608CFF0426h
                                  xor eax, eax
                                  jmp 00007F608CFF0470h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F608CFF01ECh
                                  cmp esi, 01h
                                  mov dword ptr [ebp+0Ch], eax
                                  jne 00007F608CFF042Eh
                                  test eax, eax
                                  jne 00007F608CFF0459h
                                  push edi
                                  push eax
                                  push ebx
                                  call 00007F608CFF0316h
                                  test esi, esi
                                  je 00007F608CFF0427h
                                  cmp esi, 03h
                                  jne 00007F608CFF0448h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F608CFF0305h
                                  test eax, eax
                                  jne 00007F608CFF0425h
                                  and dword ptr [ebp+0Ch], eax
                                  cmp dword ptr [ebp+0Ch], 00000000h
                                  je 00007F608CFF0433h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007F608CFF042Ah
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  mov dword ptr [ebp+0Ch], eax
                                  mov eax, dword ptr [ebp+0Ch]
                                  pop edi
                                  pop esi
                                  pop ebx
                                  pop ebp
                                  retn 000Ch
                                  jmp dword ptr [10002028h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  Programming Language:
                                  • [ C ] VS98 (6.0) build 8168
                                  • [C++] VS98 (6.0) build 8168
                                  • [RES] VS98 (6.0) cvtres build 1720
                                  • [LNK] VS98 (6.0) imp/exp build 8168
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x40000x5000600x5010000722e36a48e6886a711db5f072508407unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  W0x40600x500000dataEnglishUnited States0.7055644989013672
                                  DLLImport
                                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                  NameOrdinalAddress
                                  PlayGame10x10001114
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-15T14:06:14.822203+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.6557711.1.1.153UDP
                                  2025-01-15T14:06:15.344838+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649734104.16.167.22880TCP
                                  2025-01-15T14:06:15.344838+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649734104.16.167.22880TCP
                                  2025-01-15T14:06:15.344838+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649734104.16.167.22880TCP
                                  2025-01-15T14:06:15.344838+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649734104.16.167.22880TCP
                                  2025-01-15T14:06:15.344838+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649734104.16.167.22880TCP
                                  2025-01-15T14:06:15.345942+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.649734TCP
                                  2025-01-15T14:06:16.448448+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649743104.16.167.22880TCP
                                  2025-01-15T14:06:16.448448+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649743104.16.167.22880TCP
                                  2025-01-15T14:06:16.448448+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649743104.16.167.22880TCP
                                  2025-01-15T14:06:16.448448+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649743104.16.167.22880TCP
                                  2025-01-15T14:06:16.448448+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649743104.16.167.22880TCP
                                  2025-01-15T14:06:16.449130+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.649743TCP
                                  2025-01-15T14:06:17.526731+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649765104.16.167.22880TCP
                                  2025-01-15T14:06:17.526731+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649765104.16.167.22880TCP
                                  2025-01-15T14:06:17.526731+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649765104.16.167.22880TCP
                                  2025-01-15T14:06:17.526731+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649765104.16.167.22880TCP
                                  2025-01-15T14:06:17.526731+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649765104.16.167.22880TCP
                                  2025-01-15T14:06:17.527728+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.649765TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 15, 2025 14:06:07.246048927 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.246247053 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.251518965 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.251543045 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.251774073 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.253185034 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.253247023 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.253253937 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.253407955 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.295335054 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.425048113 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.426281929 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.426315069 CET4434971140.115.3.253192.168.2.6
                                  Jan 15, 2025 14:06:07.426338911 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.426373959 CET49711443192.168.2.640.115.3.253
                                  Jan 15, 2025 14:06:07.794342995 CET49673443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:07.794351101 CET49674443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:08.091108084 CET49672443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:14.311989069 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:14.312063932 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:14.312175035 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:14.312815905 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:14.312849998 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:14.871540070 CET4973480192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:14.876415968 CET8049734104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:14.876529932 CET4973480192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:14.877509117 CET4973480192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:14.882379055 CET8049734104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:15.119286060 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.119462013 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.125828028 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.125849962 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.126920938 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.128926992 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.129416943 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.129430056 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.129569054 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.175338030 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.305690050 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.305778980 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.305856943 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.311072111 CET49730443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:15.311100006 CET4434973040.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:15.344731092 CET8049734104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:15.344837904 CET4973480192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:15.345942020 CET8049734104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:15.345998049 CET4973480192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:15.347246885 CET4973480192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:15.352032900 CET8049734104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:15.947354078 CET4974380192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:15.952121973 CET8049743104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:15.952198029 CET4974380192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:15.952399015 CET4974380192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:15.957150936 CET8049743104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:16.448385954 CET8049743104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:16.448447943 CET4974380192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:16.448542118 CET4974380192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:16.449130058 CET8049743104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:16.449388981 CET4974380192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:16.453270912 CET8049743104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:16.491796970 CET49746445192.168.2.6113.215.140.129
                                  Jan 15, 2025 14:06:16.496666908 CET44549746113.215.140.129192.168.2.6
                                  Jan 15, 2025 14:06:16.496779919 CET49746445192.168.2.6113.215.140.129
                                  Jan 15, 2025 14:06:16.496824026 CET49746445192.168.2.6113.215.140.129
                                  Jan 15, 2025 14:06:16.502765894 CET44549746113.215.140.129192.168.2.6
                                  Jan 15, 2025 14:06:16.502821922 CET49746445192.168.2.6113.215.140.129
                                  Jan 15, 2025 14:06:16.529283047 CET49747445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.534158945 CET44549747113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:16.534238100 CET49747445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.534858942 CET49747445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.537048101 CET49749445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.539680004 CET44549747113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:16.539757013 CET49747445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.541877985 CET44549749113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:16.542068958 CET49749445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.542112112 CET49749445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:16.546974897 CET44549749113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:17.051680088 CET4976580192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:17.056591988 CET8049765104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:17.056700945 CET4976580192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:17.056844950 CET4976580192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:17.061676979 CET8049765104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:17.403584957 CET49673443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:17.403598070 CET49674443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:17.526659966 CET8049765104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:17.526731014 CET4976580192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:17.526812077 CET4976580192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:17.527728081 CET8049765104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:17.527775049 CET4976580192.168.2.6104.16.167.228
                                  Jan 15, 2025 14:06:17.531650066 CET8049765104.16.167.228192.168.2.6
                                  Jan 15, 2025 14:06:17.700467110 CET49672443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:18.529130936 CET49787445192.168.2.6190.117.95.92
                                  Jan 15, 2025 14:06:18.533935070 CET44549787190.117.95.92192.168.2.6
                                  Jan 15, 2025 14:06:18.534322023 CET49787445192.168.2.6190.117.95.92
                                  Jan 15, 2025 14:06:18.534322023 CET49787445192.168.2.6190.117.95.92
                                  Jan 15, 2025 14:06:18.534365892 CET49788445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.539238930 CET44549788190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:18.539331913 CET49788445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.539869070 CET44549787190.117.95.92192.168.2.6
                                  Jan 15, 2025 14:06:18.541732073 CET49788445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.543260098 CET49789445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.546374083 CET44549787190.117.95.92192.168.2.6
                                  Jan 15, 2025 14:06:18.546421051 CET49787445192.168.2.6190.117.95.92
                                  Jan 15, 2025 14:06:18.547908068 CET44549788190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:18.547986984 CET44549789190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:18.548192978 CET49789445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.548362017 CET49789445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.549145937 CET44549788190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:18.549216986 CET49788445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:18.553080082 CET44549789190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:19.351032019 CET44349705173.222.162.64192.168.2.6
                                  Jan 15, 2025 14:06:19.351109028 CET49705443192.168.2.6173.222.162.64
                                  Jan 15, 2025 14:06:20.530445099 CET49822445192.168.2.6206.46.140.84
                                  Jan 15, 2025 14:06:20.535293102 CET44549822206.46.140.84192.168.2.6
                                  Jan 15, 2025 14:06:20.535480976 CET49822445192.168.2.6206.46.140.84
                                  Jan 15, 2025 14:06:20.535546064 CET49822445192.168.2.6206.46.140.84
                                  Jan 15, 2025 14:06:20.535763025 CET49823445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.540890932 CET44549822206.46.140.84192.168.2.6
                                  Jan 15, 2025 14:06:20.540930986 CET44549823206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:20.541120052 CET49822445192.168.2.6206.46.140.84
                                  Jan 15, 2025 14:06:20.541151047 CET49823445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.541228056 CET49823445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.543967962 CET49824445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.546206951 CET44549823206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:20.546289921 CET49823445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.548752069 CET44549824206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:20.548928976 CET49824445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.548978090 CET49824445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:20.553761959 CET44549824206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:22.546129942 CET49862445192.168.2.6194.169.32.174
                                  Jan 15, 2025 14:06:22.553483963 CET44549862194.169.32.174192.168.2.6
                                  Jan 15, 2025 14:06:22.553724051 CET49862445192.168.2.6194.169.32.174
                                  Jan 15, 2025 14:06:22.553724051 CET49862445192.168.2.6194.169.32.174
                                  Jan 15, 2025 14:06:22.553925037 CET49863445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.560760021 CET44549863194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:22.561007023 CET49863445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.561007023 CET49863445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.561140060 CET44549862194.169.32.174192.168.2.6
                                  Jan 15, 2025 14:06:22.561223030 CET49862445192.168.2.6194.169.32.174
                                  Jan 15, 2025 14:06:22.562452078 CET49864445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.568120956 CET44549863194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:22.568295002 CET49863445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.569148064 CET44549864194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:22.569220066 CET49864445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.569276094 CET49864445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:22.576004982 CET44549864194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:24.561479092 CET49898445192.168.2.6193.196.53.20
                                  Jan 15, 2025 14:06:24.566384077 CET44549898193.196.53.20192.168.2.6
                                  Jan 15, 2025 14:06:24.566490889 CET49898445192.168.2.6193.196.53.20
                                  Jan 15, 2025 14:06:24.566531897 CET49898445192.168.2.6193.196.53.20
                                  Jan 15, 2025 14:06:24.566729069 CET49899445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.571649075 CET44549899193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:24.571680069 CET44549898193.196.53.20192.168.2.6
                                  Jan 15, 2025 14:06:24.571717024 CET49899445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.571736097 CET49898445192.168.2.6193.196.53.20
                                  Jan 15, 2025 14:06:24.571845055 CET49899445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.572792053 CET49900445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.576714993 CET44549899193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:24.576771975 CET49899445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.577735901 CET44549900193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:24.577804089 CET49900445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.577867031 CET49900445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:24.582640886 CET44549900193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:26.488564968 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:26.488603115 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:26.488946915 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:26.489173889 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:26.489185095 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:26.576251984 CET49937445192.168.2.6164.178.44.37
                                  Jan 15, 2025 14:06:26.581218004 CET44549937164.178.44.37192.168.2.6
                                  Jan 15, 2025 14:06:26.581470013 CET49937445192.168.2.6164.178.44.37
                                  Jan 15, 2025 14:06:26.581495047 CET49937445192.168.2.6164.178.44.37
                                  Jan 15, 2025 14:06:26.581639051 CET49938445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:26.586457968 CET44549938164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:26.586530924 CET44549937164.178.44.37192.168.2.6
                                  Jan 15, 2025 14:06:26.586596966 CET49937445192.168.2.6164.178.44.37
                                  Jan 15, 2025 14:06:26.586615086 CET49938445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:26.587512970 CET49939445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:26.591736078 CET44549938164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:26.592397928 CET44549939164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:26.592468977 CET49938445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:26.592503071 CET49939445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:26.592560053 CET49939445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:26.597424984 CET44549939164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:27.270239115 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.270327091 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.272685051 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.272712946 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.273041010 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.274725914 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.274976015 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.274976015 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.274991989 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.315326929 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.449872017 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.449960947 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:27.450083017 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.450191021 CET49934443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:27.450206995 CET4434993440.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:28.598107100 CET49973445192.168.2.6203.14.78.81
                                  Jan 15, 2025 14:06:28.603037119 CET44549973203.14.78.81192.168.2.6
                                  Jan 15, 2025 14:06:28.603108883 CET49973445192.168.2.6203.14.78.81
                                  Jan 15, 2025 14:06:28.603208065 CET49973445192.168.2.6203.14.78.81
                                  Jan 15, 2025 14:06:28.603368044 CET49974445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.608094931 CET44549973203.14.78.81192.168.2.6
                                  Jan 15, 2025 14:06:28.608169079 CET49973445192.168.2.6203.14.78.81
                                  Jan 15, 2025 14:06:28.608215094 CET44549974203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:28.608320951 CET49974445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.608494043 CET49974445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.610481024 CET49976445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.613542080 CET44549974203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:28.613600016 CET49974445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.615257978 CET44549976203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:28.615319014 CET49976445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.615427971 CET49976445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:28.620179892 CET44549976203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:30.607307911 CET50009445192.168.2.6112.249.87.59
                                  Jan 15, 2025 14:06:30.613353014 CET44550009112.249.87.59192.168.2.6
                                  Jan 15, 2025 14:06:30.613420963 CET50009445192.168.2.6112.249.87.59
                                  Jan 15, 2025 14:06:30.613506079 CET50009445192.168.2.6112.249.87.59
                                  Jan 15, 2025 14:06:30.613635063 CET50010445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.619625092 CET44550010112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:30.619685888 CET50010445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.619755030 CET50010445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.619988918 CET44550009112.249.87.59192.168.2.6
                                  Jan 15, 2025 14:06:30.620060921 CET50009445192.168.2.6112.249.87.59
                                  Jan 15, 2025 14:06:30.620132923 CET50011445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.624825954 CET44550010112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:30.624877930 CET50010445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.625017881 CET44550011112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:30.625307083 CET50011445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.625415087 CET50011445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:30.630217075 CET44550011112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:32.622860909 CET50048445192.168.2.626.157.13.193
                                  Jan 15, 2025 14:06:32.627866983 CET4455004826.157.13.193192.168.2.6
                                  Jan 15, 2025 14:06:32.627960920 CET50048445192.168.2.626.157.13.193
                                  Jan 15, 2025 14:06:32.628089905 CET50048445192.168.2.626.157.13.193
                                  Jan 15, 2025 14:06:32.628245115 CET50049445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.632977009 CET4455004826.157.13.193192.168.2.6
                                  Jan 15, 2025 14:06:32.633027077 CET50048445192.168.2.626.157.13.193
                                  Jan 15, 2025 14:06:32.633052111 CET4455004926.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:32.633196115 CET50049445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.633263111 CET50049445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.633500099 CET50050445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.638233900 CET4455004926.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:32.638300896 CET50049445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.638345957 CET4455005026.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:32.638417006 CET50050445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.638459921 CET50050445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:32.643218040 CET4455005026.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:34.638464928 CET50085445192.168.2.6124.66.139.49
                                  Jan 15, 2025 14:06:34.643342972 CET44550085124.66.139.49192.168.2.6
                                  Jan 15, 2025 14:06:34.643537998 CET50085445192.168.2.6124.66.139.49
                                  Jan 15, 2025 14:06:34.643537998 CET50085445192.168.2.6124.66.139.49
                                  Jan 15, 2025 14:06:34.643696070 CET50086445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.648597956 CET44550086124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:34.648611069 CET44550085124.66.139.49192.168.2.6
                                  Jan 15, 2025 14:06:34.648713112 CET50086445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.648727894 CET50085445192.168.2.6124.66.139.49
                                  Jan 15, 2025 14:06:34.648865938 CET50086445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.649315119 CET50087445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.653665066 CET44550086124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:34.653733015 CET50086445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.654191971 CET44550087124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:34.654256105 CET50087445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.654298067 CET50087445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:34.659049988 CET44550087124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:36.654117107 CET50123445192.168.2.6178.115.204.122
                                  Jan 15, 2025 14:06:36.658931971 CET44550123178.115.204.122192.168.2.6
                                  Jan 15, 2025 14:06:36.659034014 CET50123445192.168.2.6178.115.204.122
                                  Jan 15, 2025 14:06:36.659054041 CET50123445192.168.2.6178.115.204.122
                                  Jan 15, 2025 14:06:36.659174919 CET50124445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.664026022 CET44550124178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:36.664077997 CET44550123178.115.204.122192.168.2.6
                                  Jan 15, 2025 14:06:36.664098978 CET50124445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.664113045 CET50124445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.664133072 CET50123445192.168.2.6178.115.204.122
                                  Jan 15, 2025 14:06:36.664455891 CET50125445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.669219971 CET44550124178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:36.669281960 CET50124445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.669332027 CET44550125178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:36.669415951 CET50125445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.669415951 CET50125445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:36.674231052 CET44550125178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:37.904227018 CET44549749113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:37.904299974 CET49749445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:37.904351950 CET49749445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:37.904411077 CET49749445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:37.909147978 CET44549749113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:37.909176111 CET44549749113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:38.670270920 CET50163445192.168.2.6117.248.83.207
                                  Jan 15, 2025 14:06:38.675213099 CET44550163117.248.83.207192.168.2.6
                                  Jan 15, 2025 14:06:38.675266027 CET50163445192.168.2.6117.248.83.207
                                  Jan 15, 2025 14:06:38.675338030 CET50163445192.168.2.6117.248.83.207
                                  Jan 15, 2025 14:06:38.675453901 CET50164445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.680211067 CET44550164117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:06:38.680248976 CET44550163117.248.83.207192.168.2.6
                                  Jan 15, 2025 14:06:38.680313110 CET50163445192.168.2.6117.248.83.207
                                  Jan 15, 2025 14:06:38.680334091 CET50164445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.680408955 CET50164445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.682486057 CET50165445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.685246944 CET44550164117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:06:38.685298920 CET50164445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.687201977 CET44550165117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:06:38.687278032 CET50165445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.687320948 CET50165445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:06:38.692070961 CET44550165117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:06:39.919164896 CET44549789190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:39.919308901 CET49789445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:39.919682980 CET49789445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:39.919748068 CET49789445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:39.924504995 CET44549789190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:39.924521923 CET44549789190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:40.685458899 CET50198445192.168.2.6147.169.12.41
                                  Jan 15, 2025 14:06:40.690339088 CET44550198147.169.12.41192.168.2.6
                                  Jan 15, 2025 14:06:40.690431118 CET50198445192.168.2.6147.169.12.41
                                  Jan 15, 2025 14:06:40.690462112 CET50198445192.168.2.6147.169.12.41
                                  Jan 15, 2025 14:06:40.690979958 CET50199445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.695404053 CET44550198147.169.12.41192.168.2.6
                                  Jan 15, 2025 14:06:40.695597887 CET50198445192.168.2.6147.169.12.41
                                  Jan 15, 2025 14:06:40.695818901 CET44550199147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:06:40.695904016 CET50199445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.695904016 CET50199445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.696162939 CET50200445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.700889111 CET44550199147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:06:40.700988054 CET44550200147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:06:40.701047897 CET50200445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.701066971 CET50200445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.702347040 CET50199445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:06:40.705914974 CET44550200147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:06:40.919528008 CET50206445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:40.924402952 CET44550206113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:40.927030087 CET50206445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:40.927128077 CET50206445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:06:40.931953907 CET44550206113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:06:41.920445919 CET44549824206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:41.920556068 CET49824445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:41.920618057 CET49824445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:41.920701027 CET49824445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:41.925538063 CET44549824206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:41.925554991 CET44549824206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:42.700964928 CET50218445192.168.2.672.185.209.133
                                  Jan 15, 2025 14:06:42.705928087 CET4455021872.185.209.133192.168.2.6
                                  Jan 15, 2025 14:06:42.706154108 CET50218445192.168.2.672.185.209.133
                                  Jan 15, 2025 14:06:42.706154108 CET50218445192.168.2.672.185.209.133
                                  Jan 15, 2025 14:06:42.706322908 CET50219445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.711133957 CET4455021972.185.209.1192.168.2.6
                                  Jan 15, 2025 14:06:42.711221933 CET50219445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.711251974 CET4455021872.185.209.133192.168.2.6
                                  Jan 15, 2025 14:06:42.711261988 CET50219445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.711304903 CET50218445192.168.2.672.185.209.133
                                  Jan 15, 2025 14:06:42.711625099 CET50220445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.716223955 CET4455021972.185.209.1192.168.2.6
                                  Jan 15, 2025 14:06:42.716310978 CET50219445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.716413021 CET4455022072.185.209.1192.168.2.6
                                  Jan 15, 2025 14:06:42.716480017 CET50220445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.716506958 CET50220445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:06:42.721344948 CET4455022072.185.209.1192.168.2.6
                                  Jan 15, 2025 14:06:42.935165882 CET50223445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:42.940114021 CET44550223190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:42.940211058 CET50223445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:42.940244913 CET50223445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:06:42.945131063 CET44550223190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:06:43.951694965 CET44549864194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:43.951757908 CET49864445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:43.951812029 CET49864445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:43.951875925 CET49864445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:43.956588030 CET44549864194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:43.956604958 CET44549864194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:44.716671944 CET50236445192.168.2.658.48.182.244
                                  Jan 15, 2025 14:06:44.721452951 CET4455023658.48.182.244192.168.2.6
                                  Jan 15, 2025 14:06:44.723103046 CET50236445192.168.2.658.48.182.244
                                  Jan 15, 2025 14:06:44.725135088 CET50236445192.168.2.658.48.182.244
                                  Jan 15, 2025 14:06:44.725289106 CET50237445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.729909897 CET4455023658.48.182.244192.168.2.6
                                  Jan 15, 2025 14:06:44.729959965 CET50236445192.168.2.658.48.182.244
                                  Jan 15, 2025 14:06:44.730022907 CET4455023758.48.182.1192.168.2.6
                                  Jan 15, 2025 14:06:44.730220079 CET50237445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.730288982 CET50237445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.730576038 CET50238445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.735096931 CET4455023758.48.182.1192.168.2.6
                                  Jan 15, 2025 14:06:44.735143900 CET50237445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.735342979 CET4455023858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:06:44.735395908 CET50238445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.735415936 CET50238445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:06:44.740180969 CET4455023858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:06:44.935358047 CET50240445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:44.940296888 CET44550240206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:44.943085909 CET50240445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:44.943136930 CET50240445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:06:44.947921038 CET44550240206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:06:45.020237923 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.020287991 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.020371914 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.020922899 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.020944118 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.813160896 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.813278913 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.815239906 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.815257072 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.815512896 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.817256927 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.817312956 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.817318916 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.817442894 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:45.859330893 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:45.952920914 CET44549900193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:45.953042030 CET49900445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:45.953107119 CET49900445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:45.953181982 CET49900445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:45.957844973 CET44549900193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:45.957907915 CET44549900193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:46.009782076 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:46.009861946 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:46.010341883 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:46.010374069 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:46.010390043 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:46.010390043 CET50241443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:06:46.010400057 CET4435024140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:06:46.732079983 CET50254445192.168.2.6221.220.9.71
                                  Jan 15, 2025 14:06:46.736969948 CET44550254221.220.9.71192.168.2.6
                                  Jan 15, 2025 14:06:46.737031937 CET50254445192.168.2.6221.220.9.71
                                  Jan 15, 2025 14:06:46.737052917 CET50254445192.168.2.6221.220.9.71
                                  Jan 15, 2025 14:06:46.737173080 CET50256445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.742039919 CET44550256221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:06:46.742093086 CET50256445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.742108107 CET50256445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.742410898 CET50257445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.743894100 CET44550254221.220.9.71192.168.2.6
                                  Jan 15, 2025 14:06:46.747236013 CET44550257221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:06:46.747297049 CET50257445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.747325897 CET50257445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.748177052 CET44550256221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:06:46.749315023 CET44550254221.220.9.71192.168.2.6
                                  Jan 15, 2025 14:06:46.749367952 CET50254445192.168.2.6221.220.9.71
                                  Jan 15, 2025 14:06:46.749821901 CET44550256221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:06:46.749953985 CET50256445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:06:46.752058029 CET44550257221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:06:46.966728926 CET50259445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:46.971533060 CET44550259194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:46.971596003 CET50259445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:46.971633911 CET50259445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:06:46.976418972 CET44550259194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:06:47.987879038 CET44549939164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:47.987950087 CET49939445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:47.988185883 CET49939445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:47.988187075 CET49939445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:47.993021965 CET44549939164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:47.993050098 CET44549939164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:48.747915983 CET50271445192.168.2.6142.118.225.79
                                  Jan 15, 2025 14:06:48.752753019 CET44550271142.118.225.79192.168.2.6
                                  Jan 15, 2025 14:06:48.752880096 CET50271445192.168.2.6142.118.225.79
                                  Jan 15, 2025 14:06:48.752944946 CET50271445192.168.2.6142.118.225.79
                                  Jan 15, 2025 14:06:48.753212929 CET50272445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.757792950 CET44550271142.118.225.79192.168.2.6
                                  Jan 15, 2025 14:06:48.757858992 CET50271445192.168.2.6142.118.225.79
                                  Jan 15, 2025 14:06:48.757983923 CET44550272142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:06:48.758045912 CET50272445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.758079052 CET50272445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.758322954 CET50273445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.763030052 CET44550272142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:06:48.763099909 CET50272445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.763216972 CET44550273142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:06:48.763283014 CET50273445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.763303041 CET50273445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:06:48.768193007 CET44550273142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:06:48.967268944 CET50274445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:48.972137928 CET44550274193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:48.972227097 CET50274445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:48.972296953 CET50274445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:06:48.977045059 CET44550274193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:06:49.999933958 CET44549976203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:50.000014067 CET49976445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:50.000062943 CET49976445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:50.000108957 CET49976445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:50.005183935 CET44549976203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:50.005199909 CET44549976203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:50.763381004 CET50288445192.168.2.6211.202.36.12
                                  Jan 15, 2025 14:06:50.768928051 CET44550288211.202.36.12192.168.2.6
                                  Jan 15, 2025 14:06:50.770450115 CET50288445192.168.2.6211.202.36.12
                                  Jan 15, 2025 14:06:50.770450115 CET50288445192.168.2.6211.202.36.12
                                  Jan 15, 2025 14:06:50.770541906 CET50289445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.775331020 CET44550289211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:06:50.775480986 CET44550288211.202.36.12192.168.2.6
                                  Jan 15, 2025 14:06:50.775573969 CET50288445192.168.2.6211.202.36.12
                                  Jan 15, 2025 14:06:50.775580883 CET50289445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.775660038 CET50289445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.775877953 CET50290445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.780563116 CET44550289211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:06:50.780647039 CET44550290211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:06:50.780704975 CET50289445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.780735970 CET50290445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.780770063 CET50290445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:06:50.785494089 CET44550290211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:06:50.997757912 CET50291445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:51.002580881 CET44550291164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:51.002700090 CET50291445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:51.002779007 CET50291445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:06:51.007484913 CET44550291164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:06:52.018610001 CET44550011112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:52.018676996 CET50011445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:52.018748045 CET50011445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:52.018748045 CET50011445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:52.024827957 CET44550011112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:52.024842024 CET44550011112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:52.752104044 CET50301445192.168.2.697.12.204.168
                                  Jan 15, 2025 14:06:52.756946087 CET4455030197.12.204.168192.168.2.6
                                  Jan 15, 2025 14:06:52.757014036 CET50301445192.168.2.697.12.204.168
                                  Jan 15, 2025 14:06:52.757088900 CET50301445192.168.2.697.12.204.168
                                  Jan 15, 2025 14:06:52.757231951 CET50304445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.762006998 CET4455030497.12.204.1192.168.2.6
                                  Jan 15, 2025 14:06:52.762070894 CET50304445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.762176991 CET50304445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.762379885 CET4455030197.12.204.168192.168.2.6
                                  Jan 15, 2025 14:06:52.762455940 CET50301445192.168.2.697.12.204.168
                                  Jan 15, 2025 14:06:52.762574911 CET50305445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.767349005 CET4455030497.12.204.1192.168.2.6
                                  Jan 15, 2025 14:06:52.767365932 CET4455030597.12.204.1192.168.2.6
                                  Jan 15, 2025 14:06:52.767400026 CET50304445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.767466068 CET50305445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.767539978 CET50305445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:06:52.772274017 CET4455030597.12.204.1192.168.2.6
                                  Jan 15, 2025 14:06:53.013228893 CET50306445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:53.018171072 CET44550306203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:53.018251896 CET50306445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:53.018292904 CET50306445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:06:53.023061037 CET44550306203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:06:53.999927998 CET4455005026.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:54.002813101 CET50050445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:54.002813101 CET50050445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:54.002845049 CET50050445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:54.007869959 CET4455005026.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:54.007883072 CET4455005026.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:54.497971058 CET50307445192.168.2.63.102.3.252
                                  Jan 15, 2025 14:06:54.502984047 CET445503073.102.3.252192.168.2.6
                                  Jan 15, 2025 14:06:54.504757881 CET50307445192.168.2.63.102.3.252
                                  Jan 15, 2025 14:06:54.504791975 CET50307445192.168.2.63.102.3.252
                                  Jan 15, 2025 14:06:54.505115032 CET50308445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.509898901 CET445503083.102.3.1192.168.2.6
                                  Jan 15, 2025 14:06:54.510112047 CET445503073.102.3.252192.168.2.6
                                  Jan 15, 2025 14:06:54.510195017 CET50307445192.168.2.63.102.3.252
                                  Jan 15, 2025 14:06:54.510217905 CET50308445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.510217905 CET50308445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.510586023 CET50309445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.515186071 CET445503083.102.3.1192.168.2.6
                                  Jan 15, 2025 14:06:54.515379906 CET445503093.102.3.1192.168.2.6
                                  Jan 15, 2025 14:06:54.515434027 CET50308445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.515460968 CET50309445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.515494108 CET50309445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:06:54.520226002 CET445503093.102.3.1192.168.2.6
                                  Jan 15, 2025 14:06:55.029081106 CET50310445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:55.034152031 CET44550310112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:55.039230108 CET50310445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:55.041565895 CET50310445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:06:55.046706915 CET44550310112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:06:56.015752077 CET44550087124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:56.015831947 CET50087445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:56.015877962 CET50087445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:56.015929937 CET50087445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:56.020612001 CET44550087124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:56.020718098 CET44550087124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:56.138709068 CET50311445192.168.2.6196.233.112.172
                                  Jan 15, 2025 14:06:56.143501043 CET44550311196.233.112.172192.168.2.6
                                  Jan 15, 2025 14:06:56.143624067 CET50311445192.168.2.6196.233.112.172
                                  Jan 15, 2025 14:06:56.143663883 CET50311445192.168.2.6196.233.112.172
                                  Jan 15, 2025 14:06:56.143903017 CET50312445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.148586988 CET44550311196.233.112.172192.168.2.6
                                  Jan 15, 2025 14:06:56.148649931 CET50311445192.168.2.6196.233.112.172
                                  Jan 15, 2025 14:06:56.148669958 CET44550312196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:06:56.148730040 CET50312445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.148749113 CET50312445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.149049044 CET50313445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.153748035 CET44550312196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:06:56.153795958 CET50312445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.153904915 CET44550313196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:06:56.153975964 CET50313445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.154017925 CET50313445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:06:56.158847094 CET44550313196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:06:57.013276100 CET50314445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:57.018208981 CET4455031426.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:57.018287897 CET50314445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:57.018320084 CET50314445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:06:57.023102999 CET4455031426.157.13.1192.168.2.6
                                  Jan 15, 2025 14:06:57.669673920 CET50315445192.168.2.6190.193.78.139
                                  Jan 15, 2025 14:06:57.674498081 CET44550315190.193.78.139192.168.2.6
                                  Jan 15, 2025 14:06:57.674566031 CET50315445192.168.2.6190.193.78.139
                                  Jan 15, 2025 14:06:57.674638033 CET50315445192.168.2.6190.193.78.139
                                  Jan 15, 2025 14:06:57.674750090 CET50316445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.679616928 CET44550316190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:06:57.679625988 CET44550315190.193.78.139192.168.2.6
                                  Jan 15, 2025 14:06:57.679691076 CET50315445192.168.2.6190.193.78.139
                                  Jan 15, 2025 14:06:57.679702997 CET50316445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.679769039 CET50316445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.680102110 CET50317445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.684771061 CET44550316190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:06:57.684828043 CET50316445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.684978962 CET44550317190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:06:57.685054064 CET50317445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.685098886 CET50317445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:57.689834118 CET44550317190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:06:58.049057961 CET44550125178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:58.049120903 CET50125445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:58.049158096 CET50125445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:58.049201012 CET50125445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:06:58.053940058 CET44550125178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:58.053949118 CET44550125178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:06:59.028985977 CET50318445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:59.033940077 CET44550318124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:59.035111904 CET50318445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:59.035144091 CET50318445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:06:59.039977074 CET44550318124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:06:59.091787100 CET50319445192.168.2.6183.16.117.114
                                  Jan 15, 2025 14:06:59.096899986 CET44550319183.16.117.114192.168.2.6
                                  Jan 15, 2025 14:06:59.097264051 CET50319445192.168.2.6183.16.117.114
                                  Jan 15, 2025 14:06:59.097352028 CET50319445192.168.2.6183.16.117.114
                                  Jan 15, 2025 14:06:59.097505093 CET50320445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.102349043 CET44550319183.16.117.114192.168.2.6
                                  Jan 15, 2025 14:06:59.102394104 CET44550320183.16.117.1192.168.2.6
                                  Jan 15, 2025 14:06:59.102459908 CET50319445192.168.2.6183.16.117.114
                                  Jan 15, 2025 14:06:59.102479935 CET50320445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.102554083 CET50320445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.102796078 CET50321445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.107517958 CET44550320183.16.117.1192.168.2.6
                                  Jan 15, 2025 14:06:59.107599020 CET50320445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.107646942 CET44550321183.16.117.1192.168.2.6
                                  Jan 15, 2025 14:06:59.111068964 CET50321445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.111105919 CET50321445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:06:59.115889072 CET44550321183.16.117.1192.168.2.6
                                  Jan 15, 2025 14:06:59.509279966 CET44550317190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:06:59.509502888 CET50317445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:59.509502888 CET50317445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:59.509502888 CET50317445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:06:59.514426947 CET44550317190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:06:59.514446974 CET44550317190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:07:00.081793070 CET44550165117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:07:00.081911087 CET50165445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:00.082287073 CET50165445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:00.082346916 CET50165445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:00.087063074 CET44550165117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:07:00.087117910 CET44550165117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:07:00.420458078 CET50322445192.168.2.6223.166.26.70
                                  Jan 15, 2025 14:07:00.425275087 CET44550322223.166.26.70192.168.2.6
                                  Jan 15, 2025 14:07:00.425348043 CET50322445192.168.2.6223.166.26.70
                                  Jan 15, 2025 14:07:00.425540924 CET50322445192.168.2.6223.166.26.70
                                  Jan 15, 2025 14:07:00.425769091 CET50323445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.430299997 CET44550322223.166.26.70192.168.2.6
                                  Jan 15, 2025 14:07:00.430345058 CET50322445192.168.2.6223.166.26.70
                                  Jan 15, 2025 14:07:00.430546999 CET44550323223.166.26.1192.168.2.6
                                  Jan 15, 2025 14:07:00.430599928 CET50323445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.430800915 CET50323445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.431381941 CET50324445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.435617924 CET44550323223.166.26.1192.168.2.6
                                  Jan 15, 2025 14:07:00.435672998 CET50323445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.436182976 CET44550324223.166.26.1192.168.2.6
                                  Jan 15, 2025 14:07:00.436244965 CET50324445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.437736034 CET50324445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:00.442536116 CET44550324223.166.26.1192.168.2.6
                                  Jan 15, 2025 14:07:01.060067892 CET50326445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:07:01.065666914 CET44550326178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:07:01.065766096 CET50326445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:07:01.065807104 CET50326445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:07:01.071240902 CET44550326178.115.204.1192.168.2.6
                                  Jan 15, 2025 14:07:01.669905901 CET50327445192.168.2.6202.206.2.7
                                  Jan 15, 2025 14:07:01.835441113 CET44550327202.206.2.7192.168.2.6
                                  Jan 15, 2025 14:07:01.835607052 CET50327445192.168.2.6202.206.2.7
                                  Jan 15, 2025 14:07:01.835699081 CET50327445192.168.2.6202.206.2.7
                                  Jan 15, 2025 14:07:01.835885048 CET50328445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.848392010 CET44550328202.206.2.1192.168.2.6
                                  Jan 15, 2025 14:07:01.848541021 CET50328445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.848541021 CET50328445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.848982096 CET50329445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.851392031 CET44550327202.206.2.7192.168.2.6
                                  Jan 15, 2025 14:07:01.851465940 CET50327445192.168.2.6202.206.2.7
                                  Jan 15, 2025 14:07:01.853852034 CET44550329202.206.2.1192.168.2.6
                                  Jan 15, 2025 14:07:01.853924036 CET50329445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.853971004 CET50329445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.854326963 CET44550328202.206.2.1192.168.2.6
                                  Jan 15, 2025 14:07:01.854381084 CET50328445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:01.859606981 CET44550329202.206.2.1192.168.2.6
                                  Jan 15, 2025 14:07:02.098263979 CET44550200147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:07:02.099131107 CET50200445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:02.099351883 CET50200445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:02.099386930 CET50200445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:02.104716063 CET44550200147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:07:02.104902029 CET44550200147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:07:02.298979998 CET44550206113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:07:02.299388885 CET50206445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:07:02.299388885 CET50206445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:07:02.299388885 CET50206445192.168.2.6113.215.140.1
                                  Jan 15, 2025 14:07:02.304543972 CET44550206113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:07:02.304580927 CET44550206113.215.140.1192.168.2.6
                                  Jan 15, 2025 14:07:02.357312918 CET50330445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.362396002 CET44550330113.215.140.2192.168.2.6
                                  Jan 15, 2025 14:07:02.362473965 CET50330445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.362550020 CET50330445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.362994909 CET50331445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.367597103 CET44550330113.215.140.2192.168.2.6
                                  Jan 15, 2025 14:07:02.367662907 CET50330445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.367888927 CET44550331113.215.140.2192.168.2.6
                                  Jan 15, 2025 14:07:02.367969990 CET50331445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.368029118 CET50331445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:02.372859001 CET44550331113.215.140.2192.168.2.6
                                  Jan 15, 2025 14:07:02.516526937 CET50332445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:07:02.521622896 CET44550332190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:07:02.521783113 CET50332445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:07:02.521826982 CET50332445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:07:02.526637077 CET44550332190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:07:02.828490973 CET50333445192.168.2.6197.241.66.134
                                  Jan 15, 2025 14:07:02.833676100 CET44550333197.241.66.134192.168.2.6
                                  Jan 15, 2025 14:07:02.833801031 CET50333445192.168.2.6197.241.66.134
                                  Jan 15, 2025 14:07:02.849069118 CET50333445192.168.2.6197.241.66.134
                                  Jan 15, 2025 14:07:02.849315882 CET50334445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.854127884 CET44550333197.241.66.134192.168.2.6
                                  Jan 15, 2025 14:07:02.854224920 CET50333445192.168.2.6197.241.66.134
                                  Jan 15, 2025 14:07:02.854270935 CET44550334197.241.66.1192.168.2.6
                                  Jan 15, 2025 14:07:02.854351044 CET50334445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.889555931 CET50334445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.894668102 CET44550334197.241.66.1192.168.2.6
                                  Jan 15, 2025 14:07:02.894769907 CET50334445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.904293060 CET50335445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.909183025 CET44550335197.241.66.1192.168.2.6
                                  Jan 15, 2025 14:07:02.909271955 CET50335445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.909303904 CET50335445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:02.914145947 CET44550335197.241.66.1192.168.2.6
                                  Jan 15, 2025 14:07:03.095333099 CET50336445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:03.100291967 CET44550336117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:07:03.100384951 CET50336445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:03.100408077 CET50336445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:03.105153084 CET44550336117.248.83.1192.168.2.6
                                  Jan 15, 2025 14:07:03.904273987 CET50337445192.168.2.6100.17.55.104
                                  Jan 15, 2025 14:07:03.909415007 CET44550337100.17.55.104192.168.2.6
                                  Jan 15, 2025 14:07:03.909553051 CET50337445192.168.2.6100.17.55.104
                                  Jan 15, 2025 14:07:03.909596920 CET50337445192.168.2.6100.17.55.104
                                  Jan 15, 2025 14:07:03.909822941 CET50338445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.914530039 CET44550337100.17.55.104192.168.2.6
                                  Jan 15, 2025 14:07:03.914603949 CET50337445192.168.2.6100.17.55.104
                                  Jan 15, 2025 14:07:03.914635897 CET44550338100.17.55.1192.168.2.6
                                  Jan 15, 2025 14:07:03.914704084 CET50338445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.914798975 CET50338445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.915090084 CET50339445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.919678926 CET44550338100.17.55.1192.168.2.6
                                  Jan 15, 2025 14:07:03.919747114 CET50338445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.919975996 CET44550339100.17.55.1192.168.2.6
                                  Jan 15, 2025 14:07:03.920037031 CET50339445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.920084953 CET50339445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:03.924875021 CET44550339100.17.55.1192.168.2.6
                                  Jan 15, 2025 14:07:04.092407942 CET4455022072.185.209.1192.168.2.6
                                  Jan 15, 2025 14:07:04.092617035 CET50220445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:04.092617035 CET50220445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:04.092617035 CET50220445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:04.097512960 CET4455022072.185.209.1192.168.2.6
                                  Jan 15, 2025 14:07:04.097529888 CET4455022072.185.209.1192.168.2.6
                                  Jan 15, 2025 14:07:04.296062946 CET44550223190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:07:04.296149969 CET50223445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:07:04.296188116 CET50223445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:07:04.296252966 CET50223445192.168.2.6190.117.95.1
                                  Jan 15, 2025 14:07:04.301892042 CET44550223190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:07:04.301923990 CET44550223190.117.95.1192.168.2.6
                                  Jan 15, 2025 14:07:04.342503071 CET44550332190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:07:04.342581034 CET50332445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:07:04.342612028 CET50332445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:07:04.342634916 CET50332445192.168.2.6190.193.78.1
                                  Jan 15, 2025 14:07:04.347467899 CET44550332190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:07:04.347505093 CET44550332190.193.78.1192.168.2.6
                                  Jan 15, 2025 14:07:04.357109070 CET50340445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.362049103 CET44550340190.117.95.2192.168.2.6
                                  Jan 15, 2025 14:07:04.362122059 CET50340445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.362139940 CET50340445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.362417936 CET50341445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.367166996 CET44550340190.117.95.2192.168.2.6
                                  Jan 15, 2025 14:07:04.367238998 CET44550341190.117.95.2192.168.2.6
                                  Jan 15, 2025 14:07:04.367254019 CET50340445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.367324114 CET50341445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.367342949 CET50341445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:04.372225046 CET44550341190.117.95.2192.168.2.6
                                  Jan 15, 2025 14:07:04.404066086 CET50342445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.408977985 CET44550342190.193.78.2192.168.2.6
                                  Jan 15, 2025 14:07:04.409136057 CET50342445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.409173965 CET50342445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.409472942 CET50343445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.414257050 CET44550342190.193.78.2192.168.2.6
                                  Jan 15, 2025 14:07:04.414313078 CET44550343190.193.78.2192.168.2.6
                                  Jan 15, 2025 14:07:04.414335966 CET50342445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.414396048 CET50343445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.414419889 CET50343445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:04.419229984 CET44550343190.193.78.2192.168.2.6
                                  Jan 15, 2025 14:07:04.920006990 CET50344445192.168.2.651.237.225.232
                                  Jan 15, 2025 14:07:04.925086975 CET4455034451.237.225.232192.168.2.6
                                  Jan 15, 2025 14:07:04.925170898 CET50344445192.168.2.651.237.225.232
                                  Jan 15, 2025 14:07:04.925193071 CET50344445192.168.2.651.237.225.232
                                  Jan 15, 2025 14:07:04.925340891 CET50345445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.930243969 CET4455034551.237.225.1192.168.2.6
                                  Jan 15, 2025 14:07:04.930275917 CET4455034451.237.225.232192.168.2.6
                                  Jan 15, 2025 14:07:04.930310011 CET50345445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.930337906 CET50344445192.168.2.651.237.225.232
                                  Jan 15, 2025 14:07:04.930339098 CET50345445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.930587053 CET50346445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.935328960 CET4455034551.237.225.1192.168.2.6
                                  Jan 15, 2025 14:07:04.935373068 CET50345445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.935480118 CET4455034651.237.225.1192.168.2.6
                                  Jan 15, 2025 14:07:04.935538054 CET50346445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.935578108 CET50346445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:04.940433025 CET4455034651.237.225.1192.168.2.6
                                  Jan 15, 2025 14:07:05.107115030 CET50347445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:05.113065004 CET44550347147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:07:05.113197088 CET50347445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:05.113229036 CET50347445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:05.118937969 CET44550347147.169.12.1192.168.2.6
                                  Jan 15, 2025 14:07:05.861804008 CET50348445192.168.2.6116.147.245.117
                                  Jan 15, 2025 14:07:05.866808891 CET44550348116.147.245.117192.168.2.6
                                  Jan 15, 2025 14:07:05.866940975 CET50348445192.168.2.6116.147.245.117
                                  Jan 15, 2025 14:07:05.867014885 CET50348445192.168.2.6116.147.245.117
                                  Jan 15, 2025 14:07:05.867160082 CET50349445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.871910095 CET44550348116.147.245.117192.168.2.6
                                  Jan 15, 2025 14:07:05.871942997 CET44550348116.147.245.117192.168.2.6
                                  Jan 15, 2025 14:07:05.871965885 CET44550349116.147.245.1192.168.2.6
                                  Jan 15, 2025 14:07:05.872061014 CET50348445192.168.2.6116.147.245.117
                                  Jan 15, 2025 14:07:05.872071028 CET50349445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.872159004 CET50349445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.872512102 CET50350445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.877068996 CET44550349116.147.245.1192.168.2.6
                                  Jan 15, 2025 14:07:05.877144098 CET50349445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.877306938 CET44550350116.147.245.1192.168.2.6
                                  Jan 15, 2025 14:07:05.877376080 CET50350445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.883568048 CET50350445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:05.888411045 CET44550350116.147.245.1192.168.2.6
                                  Jan 15, 2025 14:07:06.095906019 CET4455023858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:07:06.096002102 CET50238445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:06.096035004 CET50238445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:06.096086025 CET50238445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:06.100857019 CET4455023858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:07:06.100871086 CET4455023858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:07:06.328468084 CET44550240206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:07:06.328542948 CET50240445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:07:06.328598022 CET50240445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:07:06.328666925 CET50240445192.168.2.6206.46.140.1
                                  Jan 15, 2025 14:07:06.333530903 CET44550240206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:07:06.333551884 CET44550240206.46.140.1192.168.2.6
                                  Jan 15, 2025 14:07:06.388344049 CET50352445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.393547058 CET44550352206.46.140.2192.168.2.6
                                  Jan 15, 2025 14:07:06.393635988 CET50352445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.393735886 CET50352445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.394119024 CET50353445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.398850918 CET44550352206.46.140.2192.168.2.6
                                  Jan 15, 2025 14:07:06.398899078 CET50352445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.399087906 CET44550353206.46.140.2192.168.2.6
                                  Jan 15, 2025 14:07:06.399153948 CET50353445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.399178028 CET50353445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:06.404467106 CET44550353206.46.140.2192.168.2.6
                                  Jan 15, 2025 14:07:06.748112917 CET50354445192.168.2.64.103.143.154
                                  Jan 15, 2025 14:07:06.789810896 CET445503544.103.143.154192.168.2.6
                                  Jan 15, 2025 14:07:06.789957047 CET50354445192.168.2.64.103.143.154
                                  Jan 15, 2025 14:07:06.790045977 CET50354445192.168.2.64.103.143.154
                                  Jan 15, 2025 14:07:06.790307045 CET50355445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.795015097 CET445503544.103.143.154192.168.2.6
                                  Jan 15, 2025 14:07:06.795082092 CET50354445192.168.2.64.103.143.154
                                  Jan 15, 2025 14:07:06.795169115 CET445503554.103.143.1192.168.2.6
                                  Jan 15, 2025 14:07:06.795238972 CET50355445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.795325041 CET50355445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.795717955 CET50356445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.800334930 CET445503554.103.143.1192.168.2.6
                                  Jan 15, 2025 14:07:06.800400972 CET50355445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.800595999 CET445503564.103.143.1192.168.2.6
                                  Jan 15, 2025 14:07:06.800662994 CET50356445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.800700903 CET50356445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:06.805527925 CET445503564.103.143.1192.168.2.6
                                  Jan 15, 2025 14:07:07.107074976 CET50357445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:07.111866951 CET4455035772.185.209.1192.168.2.6
                                  Jan 15, 2025 14:07:07.111974001 CET50357445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:07.112004042 CET50357445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:07.116724968 CET4455035772.185.209.1192.168.2.6
                                  Jan 15, 2025 14:07:07.576198101 CET50358445192.168.2.6158.42.148.145
                                  Jan 15, 2025 14:07:07.581077099 CET44550358158.42.148.145192.168.2.6
                                  Jan 15, 2025 14:07:07.581145048 CET50358445192.168.2.6158.42.148.145
                                  Jan 15, 2025 14:07:07.581180096 CET50358445192.168.2.6158.42.148.145
                                  Jan 15, 2025 14:07:07.581358910 CET50359445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.586204052 CET44550358158.42.148.145192.168.2.6
                                  Jan 15, 2025 14:07:07.586221933 CET44550359158.42.148.1192.168.2.6
                                  Jan 15, 2025 14:07:07.586261034 CET50358445192.168.2.6158.42.148.145
                                  Jan 15, 2025 14:07:07.586298943 CET50359445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.586369038 CET50359445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.586689949 CET50360445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.591214895 CET44550359158.42.148.1192.168.2.6
                                  Jan 15, 2025 14:07:07.591278076 CET50359445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.591479063 CET44550360158.42.148.1192.168.2.6
                                  Jan 15, 2025 14:07:07.591536045 CET50360445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.591566086 CET50360445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:07.596323013 CET44550360158.42.148.1192.168.2.6
                                  Jan 15, 2025 14:07:08.129170895 CET44550257221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:07:08.129239082 CET50257445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:08.129281998 CET50257445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:08.129326105 CET50257445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:08.134181023 CET44550257221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:07:08.134211063 CET44550257221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:07:08.341844082 CET50361445192.168.2.6101.126.241.145
                                  Jan 15, 2025 14:07:08.346999884 CET44550361101.126.241.145192.168.2.6
                                  Jan 15, 2025 14:07:08.347109079 CET50361445192.168.2.6101.126.241.145
                                  Jan 15, 2025 14:07:08.347182035 CET50361445192.168.2.6101.126.241.145
                                  Jan 15, 2025 14:07:08.347320080 CET50362445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.352247000 CET44550362101.126.241.1192.168.2.6
                                  Jan 15, 2025 14:07:08.352340937 CET44550361101.126.241.145192.168.2.6
                                  Jan 15, 2025 14:07:08.352375984 CET50362445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.352397919 CET50361445192.168.2.6101.126.241.145
                                  Jan 15, 2025 14:07:08.352468014 CET50362445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.352689981 CET50363445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.357465029 CET44550362101.126.241.1192.168.2.6
                                  Jan 15, 2025 14:07:08.357517004 CET44550363101.126.241.1192.168.2.6
                                  Jan 15, 2025 14:07:08.357556105 CET50362445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.357625008 CET50363445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.357660055 CET50363445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:08.358414888 CET44550259194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:07:08.358469009 CET50259445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:07:08.358506918 CET50259445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:07:08.358541965 CET50259445192.168.2.6194.169.32.1
                                  Jan 15, 2025 14:07:08.362526894 CET44550363101.126.241.1192.168.2.6
                                  Jan 15, 2025 14:07:08.363337040 CET44550259194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:07:08.363370895 CET44550259194.169.32.1192.168.2.6
                                  Jan 15, 2025 14:07:08.419775009 CET50364445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.424822092 CET44550364194.169.32.2192.168.2.6
                                  Jan 15, 2025 14:07:08.424941063 CET50364445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.424982071 CET50364445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.425308943 CET50365445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.430186987 CET44550365194.169.32.2192.168.2.6
                                  Jan 15, 2025 14:07:08.430217028 CET44550364194.169.32.2192.168.2.6
                                  Jan 15, 2025 14:07:08.430248976 CET50365445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.430282116 CET50365445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.430285931 CET50364445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:08.435241938 CET44550365194.169.32.2192.168.2.6
                                  Jan 15, 2025 14:07:08.520741940 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:08.520790100 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:08.520889997 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:08.521503925 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:08.521517992 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.106940985 CET50368445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:09.112413883 CET4455036858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:07:09.112601042 CET50368445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:09.112617016 CET50368445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:09.117458105 CET4455036858.48.182.1192.168.2.6
                                  Jan 15, 2025 14:07:09.312248945 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.312386036 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.315270901 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.315279007 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.315556049 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.319567919 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.319858074 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.319858074 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.319865942 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.367326975 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.496969938 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.497062922 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:09.497124910 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.497288942 CET50366443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:09.497311115 CET4435036640.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:10.158458948 CET44550273142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:07:10.158545971 CET50273445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:10.158592939 CET50273445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:10.158648014 CET50273445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:10.163311005 CET44550273142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:07:10.163386106 CET44550273142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:07:10.397978067 CET44550274193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:07:10.398113012 CET50274445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:07:10.398201942 CET50274445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:07:10.398201942 CET50274445192.168.2.6193.196.53.1
                                  Jan 15, 2025 14:07:10.403059959 CET44550274193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:07:10.403122902 CET44550274193.196.53.1192.168.2.6
                                  Jan 15, 2025 14:07:10.450932026 CET50372445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.455955029 CET44550372193.196.53.2192.168.2.6
                                  Jan 15, 2025 14:07:10.456044912 CET50372445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.456100941 CET50372445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.456516027 CET50373445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.461420059 CET44550372193.196.53.2192.168.2.6
                                  Jan 15, 2025 14:07:10.461432934 CET44550373193.196.53.2192.168.2.6
                                  Jan 15, 2025 14:07:10.461493969 CET50372445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.461551905 CET50373445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.461600065 CET50373445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:10.466336966 CET44550373193.196.53.2192.168.2.6
                                  Jan 15, 2025 14:07:11.138192892 CET50376445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:11.143270016 CET44550376221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:07:11.143368006 CET50376445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:11.143394947 CET50376445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:11.148221970 CET44550376221.220.9.1192.168.2.6
                                  Jan 15, 2025 14:07:12.141164064 CET44550290211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:07:12.141310930 CET50290445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:12.141355038 CET50290445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:12.141369104 CET50290445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:12.146343946 CET44550290211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:07:12.146382093 CET44550290211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:07:12.391829014 CET44550291164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:07:12.391984940 CET50291445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:07:12.392071009 CET50291445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:07:12.392071009 CET50291445192.168.2.6164.178.44.1
                                  Jan 15, 2025 14:07:12.396895885 CET44550291164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:07:12.396912098 CET44550291164.178.44.1192.168.2.6
                                  Jan 15, 2025 14:07:12.450973034 CET50384445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.455857038 CET44550384164.178.44.2192.168.2.6
                                  Jan 15, 2025 14:07:12.455976009 CET50384445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.455992937 CET50384445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.456391096 CET50385445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.461186886 CET44550384164.178.44.2192.168.2.6
                                  Jan 15, 2025 14:07:12.461263895 CET50384445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.461363077 CET44550385164.178.44.2192.168.2.6
                                  Jan 15, 2025 14:07:12.461435080 CET50385445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.461477041 CET50385445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:12.466274023 CET44550385164.178.44.2192.168.2.6
                                  Jan 15, 2025 14:07:13.169519901 CET50392445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:13.174426079 CET44550392142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:07:13.174513102 CET50392445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:13.174634933 CET50392445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:13.179419994 CET44550392142.118.225.1192.168.2.6
                                  Jan 15, 2025 14:07:14.144994974 CET4455030597.12.204.1192.168.2.6
                                  Jan 15, 2025 14:07:14.145122051 CET50305445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:14.149264097 CET50305445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:14.149296999 CET50305445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:14.154184103 CET4455030597.12.204.1192.168.2.6
                                  Jan 15, 2025 14:07:14.154217958 CET4455030597.12.204.1192.168.2.6
                                  Jan 15, 2025 14:07:14.393237114 CET44550306203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:07:14.393382072 CET50306445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:07:14.393418074 CET50306445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:07:14.393457890 CET50306445192.168.2.6203.14.78.1
                                  Jan 15, 2025 14:07:14.398797035 CET44550306203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:07:14.398842096 CET44550306203.14.78.1192.168.2.6
                                  Jan 15, 2025 14:07:14.450890064 CET50405445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.455948114 CET44550405203.14.78.2192.168.2.6
                                  Jan 15, 2025 14:07:14.456065893 CET50405445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.456098080 CET50405445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.456383944 CET50407445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.461237907 CET44550407203.14.78.2192.168.2.6
                                  Jan 15, 2025 14:07:14.461309910 CET44550405203.14.78.2192.168.2.6
                                  Jan 15, 2025 14:07:14.461338043 CET50407445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.461360931 CET50407445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.462065935 CET50405445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:14.466141939 CET44550407203.14.78.2192.168.2.6
                                  Jan 15, 2025 14:07:15.153860092 CET50416445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:15.158874035 CET44550416211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:07:15.158974886 CET50416445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:15.159014940 CET50416445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:15.163794041 CET44550416211.202.36.1192.168.2.6
                                  Jan 15, 2025 14:07:15.874233961 CET445503093.102.3.1192.168.2.6
                                  Jan 15, 2025 14:07:15.874341965 CET50309445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:15.874380112 CET50309445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:15.874413013 CET50309445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:15.880073071 CET445503093.102.3.1192.168.2.6
                                  Jan 15, 2025 14:07:15.880106926 CET445503093.102.3.1192.168.2.6
                                  Jan 15, 2025 14:07:16.405010939 CET44550310112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:07:16.405101061 CET50310445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:07:16.405190945 CET50310445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:07:16.405190945 CET50310445192.168.2.6112.249.87.1
                                  Jan 15, 2025 14:07:16.410079956 CET44550310112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:07:16.410095930 CET44550310112.249.87.1192.168.2.6
                                  Jan 15, 2025 14:07:16.466783047 CET50440445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.471745968 CET44550440112.249.87.2192.168.2.6
                                  Jan 15, 2025 14:07:16.471833944 CET50440445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.471920967 CET50440445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.472347021 CET50441445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.476959944 CET44550440112.249.87.2192.168.2.6
                                  Jan 15, 2025 14:07:16.477014065 CET50440445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.477200985 CET44550441112.249.87.2192.168.2.6
                                  Jan 15, 2025 14:07:16.477262974 CET50441445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.477313042 CET50441445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:16.482080936 CET44550441112.249.87.2192.168.2.6
                                  Jan 15, 2025 14:07:17.153914928 CET50458445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:17.160044909 CET4455045897.12.204.1192.168.2.6
                                  Jan 15, 2025 14:07:17.160178900 CET50458445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:17.160202026 CET50458445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:17.166161060 CET4455045897.12.204.1192.168.2.6
                                  Jan 15, 2025 14:07:17.552684069 CET44550313196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:07:17.552781105 CET50313445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:07:17.552781105 CET50313445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:07:17.552819967 CET50313445192.168.2.6196.233.112.1
                                  Jan 15, 2025 14:07:17.559643030 CET44550313196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:07:17.559658051 CET44550313196.233.112.1192.168.2.6
                                  Jan 15, 2025 14:07:18.373711109 CET4455031426.157.13.1192.168.2.6
                                  Jan 15, 2025 14:07:18.373795986 CET50314445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:07:18.373836994 CET50314445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:07:18.373866081 CET50314445192.168.2.626.157.13.1
                                  Jan 15, 2025 14:07:18.380258083 CET4455031426.157.13.1192.168.2.6
                                  Jan 15, 2025 14:07:18.380291939 CET4455031426.157.13.1192.168.2.6
                                  Jan 15, 2025 14:07:18.435260057 CET50497445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.440309048 CET4455049726.157.13.2192.168.2.6
                                  Jan 15, 2025 14:07:18.440404892 CET50497445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.440489054 CET50497445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.440804005 CET50498445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.446878910 CET4455049726.157.13.2192.168.2.6
                                  Jan 15, 2025 14:07:18.446947098 CET50497445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.447150946 CET4455049826.157.13.2192.168.2.6
                                  Jan 15, 2025 14:07:18.447227955 CET50498445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.447268009 CET50498445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:18.453115940 CET4455049826.157.13.2192.168.2.6
                                  Jan 15, 2025 14:07:18.888233900 CET50519445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:18.899699926 CET445505193.102.3.1192.168.2.6
                                  Jan 15, 2025 14:07:18.899794102 CET50519445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:18.899837017 CET50519445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:18.904608965 CET445505193.102.3.1192.168.2.6
                                  Jan 15, 2025 14:07:20.404984951 CET44550318124.66.139.1192.168.2.6
                                  Jan 15, 2025 14:07:20.405064106 CET50318445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:07:20.486841917 CET44550321183.16.117.1192.168.2.6
                                  Jan 15, 2025 14:07:20.486911058 CET50321445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:07:21.299257994 CET50331445192.168.2.6113.215.140.2
                                  Jan 15, 2025 14:07:21.299308062 CET50326445192.168.2.6178.115.204.1
                                  Jan 15, 2025 14:07:21.299340963 CET50373445192.168.2.6193.196.53.2
                                  Jan 15, 2025 14:07:21.299400091 CET50385445192.168.2.6164.178.44.2
                                  Jan 15, 2025 14:07:21.299477100 CET50318445192.168.2.6124.66.139.1
                                  Jan 15, 2025 14:07:21.299631119 CET50341445192.168.2.6190.117.95.2
                                  Jan 15, 2025 14:07:21.299659967 CET50365445192.168.2.6194.169.32.2
                                  Jan 15, 2025 14:07:21.299690008 CET50353445192.168.2.6206.46.140.2
                                  Jan 15, 2025 14:07:21.299712896 CET50343445192.168.2.6190.193.78.2
                                  Jan 15, 2025 14:07:21.299767971 CET50321445192.168.2.6183.16.117.1
                                  Jan 15, 2025 14:07:21.299793005 CET50324445192.168.2.6223.166.26.1
                                  Jan 15, 2025 14:07:21.299822092 CET50329445192.168.2.6202.206.2.1
                                  Jan 15, 2025 14:07:21.299953938 CET50335445192.168.2.6197.241.66.1
                                  Jan 15, 2025 14:07:21.299978018 CET50336445192.168.2.6117.248.83.1
                                  Jan 15, 2025 14:07:21.300025940 CET50346445192.168.2.651.237.225.1
                                  Jan 15, 2025 14:07:21.300072908 CET50347445192.168.2.6147.169.12.1
                                  Jan 15, 2025 14:07:21.300113916 CET50339445192.168.2.6100.17.55.1
                                  Jan 15, 2025 14:07:21.300144911 CET50350445192.168.2.6116.147.245.1
                                  Jan 15, 2025 14:07:21.300172091 CET50356445192.168.2.64.103.143.1
                                  Jan 15, 2025 14:07:21.300242901 CET50357445192.168.2.672.185.209.1
                                  Jan 15, 2025 14:07:21.300302982 CET50363445192.168.2.6101.126.241.1
                                  Jan 15, 2025 14:07:21.300323963 CET50368445192.168.2.658.48.182.1
                                  Jan 15, 2025 14:07:21.300417900 CET50392445192.168.2.6142.118.225.1
                                  Jan 15, 2025 14:07:21.300441027 CET50360445192.168.2.6158.42.148.1
                                  Jan 15, 2025 14:07:21.300441027 CET50376445192.168.2.6221.220.9.1
                                  Jan 15, 2025 14:07:21.300472975 CET50416445192.168.2.6211.202.36.1
                                  Jan 15, 2025 14:07:21.300502062 CET50407445192.168.2.6203.14.78.2
                                  Jan 15, 2025 14:07:21.300528049 CET50441445192.168.2.6112.249.87.2
                                  Jan 15, 2025 14:07:21.300900936 CET50498445192.168.2.626.157.13.2
                                  Jan 15, 2025 14:07:21.300983906 CET50519445192.168.2.63.102.3.1
                                  Jan 15, 2025 14:07:21.301841021 CET50458445192.168.2.697.12.204.1
                                  Jan 15, 2025 14:07:40.505187035 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:40.505285025 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:40.505369902 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:40.505991936 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:40.506032944 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.287641048 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.287776947 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.289639950 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.289661884 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.290457964 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.292346954 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.292395115 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.292406082 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.292529106 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.335346937 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.483563900 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.483778000 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.483900070 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.484045029 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:41.484072924 CET4435062140.113.110.67192.168.2.6
                                  Jan 15, 2025 14:07:41.484091997 CET50621443192.168.2.640.113.110.67
                                  Jan 15, 2025 14:07:47.815407038 CET49703443192.168.2.640.126.31.71
                                  Jan 15, 2025 14:07:47.815407991 CET4970680192.168.2.62.17.190.73
                                  Jan 15, 2025 14:07:47.815579891 CET4970480192.168.2.6199.232.214.172
                                  Jan 15, 2025 14:07:47.820897102 CET4434970340.126.31.71192.168.2.6
                                  Jan 15, 2025 14:07:47.820974112 CET49703443192.168.2.640.126.31.71
                                  Jan 15, 2025 14:07:47.821316957 CET80497062.17.190.73192.168.2.6
                                  Jan 15, 2025 14:07:47.821336985 CET8049704199.232.214.172192.168.2.6
                                  Jan 15, 2025 14:07:47.821365118 CET4970680192.168.2.62.17.190.73
                                  Jan 15, 2025 14:07:47.821396112 CET4970480192.168.2.6199.232.214.172
                                  Jan 15, 2025 14:07:50.614253998 CET4970780192.168.2.62.17.190.73
                                  Jan 15, 2025 14:07:50.615140915 CET4970980192.168.2.6199.232.214.172
                                  Jan 15, 2025 14:07:50.619389057 CET80497072.17.190.73192.168.2.6
                                  Jan 15, 2025 14:07:50.619453907 CET4970780192.168.2.62.17.190.73
                                  Jan 15, 2025 14:07:50.620059013 CET8049709199.232.214.172192.168.2.6
                                  Jan 15, 2025 14:07:50.620101929 CET4970980192.168.2.6199.232.214.172
                                  Jan 15, 2025 14:07:51.544665098 CET49708443192.168.2.640.126.31.71
                                  Jan 15, 2025 14:07:51.549763918 CET4434970840.126.31.71192.168.2.6
                                  Jan 15, 2025 14:07:51.549840927 CET49708443192.168.2.640.126.31.71
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 15, 2025 14:06:14.822202921 CET5577153192.168.2.61.1.1.1
                                  Jan 15, 2025 14:06:14.832412958 CET53557711.1.1.1192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 15, 2025 14:06:14.822202921 CET192.168.2.61.1.1.10x20c5Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 15, 2025 14:06:10.548958063 CET1.1.1.1192.168.2.60xa1a7No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Jan 15, 2025 14:06:10.548958063 CET1.1.1.1192.168.2.60xa1a7No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                  Jan 15, 2025 14:06:14.832412958 CET1.1.1.1192.168.2.60x20c5No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                  Jan 15, 2025 14:06:14.832412958 CET1.1.1.1192.168.2.60x20c5No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                  • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.649734104.16.167.228807148C:\Windows\mssecsvc.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 15, 2025 14:06:14.877509117 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Jan 15, 2025 14:06:15.344731092 CET778INHTTP/1.1 200 OK
                                  Date: Wed, 15 Jan 2025 13:06:15 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 902614fd7d0e32d0-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.649743104.16.167.228802976C:\Windows\mssecsvc.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 15, 2025 14:06:15.952399015 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Jan 15, 2025 14:06:16.448385954 CET778INHTTP/1.1 200 OK
                                  Date: Wed, 15 Jan 2025 13:06:16 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 90261504493a0f4a-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.649765104.16.167.228805936C:\Windows\mssecsvc.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 15, 2025 14:06:17.056844950 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Jan 15, 2025 14:06:17.526659966 CET778INHTTP/1.1 200 OK
                                  Date: Wed, 15 Jan 2025 13:06:17 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 9026150b2af118bc-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  0192.168.2.64971140.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2025-01-15 13:06:07 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4d 47 6e 43 67 35 56 44 30 45 4b 41 63 45 63 47 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 34 31 64 33 63 64 32 62 64 30 63 66 39 37 33 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: MGnCg5VD0EKAcEcG.1Context: 741d3cd2bd0cf973
                                  2025-01-15 13:06:07 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-15 13:06:07 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4d 47 6e 43 67 35 56 44 30 45 4b 41 63 45 63 47 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 34 31 64 33 63 64 32 62 64 30 63 66 39 37 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 58 70 7a 35 30 2b 54 37 73 30 33 7a 32 35 71 50 79 77 6e 32 37 79 39 75 66 32 38 77 43 75 64 74 6b 66 42 42 50 39 45 52 4c 77 49 77 71 4c 59 76 76 53 32 41 4d 33 77 61 6e 37 59 46 75 2f 59 66 2b 47 6f 34 46 31 77 50 4c 62 33 70 63 79 2f 7a 46 62 44 43 64 62 56 31 44 30 45 66 69 4e 5a 59 4d 6c 77 4f 2b 61 45 53 6f 35 65 6a 57
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: MGnCg5VD0EKAcEcG.2Context: 741d3cd2bd0cf973<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAXpz50+T7s03z25qPywn27y9uf28wCudtkfBBP9ERLwIwqLYvvS2AM3wan7YFu/Yf+Go4F1wPLb3pcy/zFbDCdbV1D0EfiNZYMlwO+aESo5ejW
                                  2025-01-15 13:06:07 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4d 47 6e 43 67 35 56 44 30 45 4b 41 63 45 63 47 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 34 31 64 33 63 64 32 62 64 30 63 66 39 37 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: MGnCg5VD0EKAcEcG.3Context: 741d3cd2bd0cf973<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-15 13:06:07 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-15 13:06:07 UTC58INData Raw: 4d 53 2d 43 56 3a 20 79 67 65 77 75 38 70 64 4a 30 71 78 71 52 67 4c 4a 48 52 57 45 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: ygewu8pdJ0qxqRgLJHRWEg.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  1192.168.2.64973040.113.110.67443
                                  TimestampBytes transferredDirectionData
                                  2025-01-15 13:06:15 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 63 6c 53 38 6d 41 4b 7a 73 55 6d 79 77 31 4c 31 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 38 62 31 36 61 30 31 32 61 39 66 32 38 36 31 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: clS8mAKzsUmyw1L1.1Context: 88b16a012a9f2861
                                  2025-01-15 13:06:15 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-15 13:06:15 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 63 6c 53 38 6d 41 4b 7a 73 55 6d 79 77 31 4c 31 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 38 62 31 36 61 30 31 32 61 39 66 32 38 36 31 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 58 70 7a 35 30 2b 54 37 73 30 33 7a 32 35 71 50 79 77 6e 32 37 79 39 75 66 32 38 77 43 75 64 74 6b 66 42 42 50 39 45 52 4c 77 49 77 71 4c 59 76 76 53 32 41 4d 33 77 61 6e 37 59 46 75 2f 59 66 2b 47 6f 34 46 31 77 50 4c 62 33 70 63 79 2f 7a 46 62 44 43 64 62 56 31 44 30 45 66 69 4e 5a 59 4d 6c 77 4f 2b 61 45 53 6f 35 65 6a 57
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: clS8mAKzsUmyw1L1.2Context: 88b16a012a9f2861<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAXpz50+T7s03z25qPywn27y9uf28wCudtkfBBP9ERLwIwqLYvvS2AM3wan7YFu/Yf+Go4F1wPLb3pcy/zFbDCdbV1D0EfiNZYMlwO+aESo5ejW
                                  2025-01-15 13:06:15 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 63 6c 53 38 6d 41 4b 7a 73 55 6d 79 77 31 4c 31 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 38 62 31 36 61 30 31 32 61 39 66 32 38 36 31 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: clS8mAKzsUmyw1L1.3Context: 88b16a012a9f2861<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-15 13:06:15 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-15 13:06:15 UTC58INData Raw: 4d 53 2d 43 56 3a 20 74 64 62 39 4c 34 58 30 71 6b 4f 43 44 63 4f 6d 42 58 52 53 4f 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: tdb9L4X0qkOCDcOmBXRSOw.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  2192.168.2.64993440.113.110.67443
                                  TimestampBytes transferredDirectionData
                                  2025-01-15 13:06:27 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4a 56 66 37 5a 68 70 6e 4e 30 43 64 41 6d 57 44 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 33 33 33 31 38 63 36 36 66 35 39 62 33 62 31 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: JVf7ZhpnN0CdAmWD.1Context: 233318c66f59b3b1
                                  2025-01-15 13:06:27 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-15 13:06:27 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4a 56 66 37 5a 68 70 6e 4e 30 43 64 41 6d 57 44 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 33 33 33 31 38 63 36 36 66 35 39 62 33 62 31 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 58 70 7a 35 30 2b 54 37 73 30 33 7a 32 35 71 50 79 77 6e 32 37 79 39 75 66 32 38 77 43 75 64 74 6b 66 42 42 50 39 45 52 4c 77 49 77 71 4c 59 76 76 53 32 41 4d 33 77 61 6e 37 59 46 75 2f 59 66 2b 47 6f 34 46 31 77 50 4c 62 33 70 63 79 2f 7a 46 62 44 43 64 62 56 31 44 30 45 66 69 4e 5a 59 4d 6c 77 4f 2b 61 45 53 6f 35 65 6a 57
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: JVf7ZhpnN0CdAmWD.2Context: 233318c66f59b3b1<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAXpz50+T7s03z25qPywn27y9uf28wCudtkfBBP9ERLwIwqLYvvS2AM3wan7YFu/Yf+Go4F1wPLb3pcy/zFbDCdbV1D0EfiNZYMlwO+aESo5ejW
                                  2025-01-15 13:06:27 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4a 56 66 37 5a 68 70 6e 4e 30 43 64 41 6d 57 44 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 33 33 33 31 38 63 36 36 66 35 39 62 33 62 31 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: JVf7ZhpnN0CdAmWD.3Context: 233318c66f59b3b1<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-15 13:06:27 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-15 13:06:27 UTC58INData Raw: 4d 53 2d 43 56 3a 20 4f 39 64 5a 4f 31 65 35 56 6b 53 42 73 70 75 71 6a 34 5a 38 30 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: O9dZO1e5VkSBspuqj4Z80w.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  3192.168.2.65024140.113.110.67443
                                  TimestampBytes transferredDirectionData
                                  2025-01-15 13:06:45 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 35 49 51 4e 63 66 61 51 32 55 36 49 69 49 59 7a 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 35 35 66 37 32 39 66 65 65 35 36 37 62 65 34 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: 5IQNcfaQ2U6IiIYz.1Context: b55f729fee567be4
                                  2025-01-15 13:06:45 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-15 13:06:45 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 35 49 51 4e 63 66 61 51 32 55 36 49 69 49 59 7a 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 35 35 66 37 32 39 66 65 65 35 36 37 62 65 34 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 58 70 7a 35 30 2b 54 37 73 30 33 7a 32 35 71 50 79 77 6e 32 37 79 39 75 66 32 38 77 43 75 64 74 6b 66 42 42 50 39 45 52 4c 77 49 77 71 4c 59 76 76 53 32 41 4d 33 77 61 6e 37 59 46 75 2f 59 66 2b 47 6f 34 46 31 77 50 4c 62 33 70 63 79 2f 7a 46 62 44 43 64 62 56 31 44 30 45 66 69 4e 5a 59 4d 6c 77 4f 2b 61 45 53 6f 35 65 6a 57
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 5IQNcfaQ2U6IiIYz.2Context: b55f729fee567be4<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAXpz50+T7s03z25qPywn27y9uf28wCudtkfBBP9ERLwIwqLYvvS2AM3wan7YFu/Yf+Go4F1wPLb3pcy/zFbDCdbV1D0EfiNZYMlwO+aESo5ejW
                                  2025-01-15 13:06:45 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 35 49 51 4e 63 66 61 51 32 55 36 49 69 49 59 7a 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 35 35 66 37 32 39 66 65 65 35 36 37 62 65 34 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: 5IQNcfaQ2U6IiIYz.3Context: b55f729fee567be4<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-15 13:06:46 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-15 13:06:46 UTC58INData Raw: 4d 53 2d 43 56 3a 20 38 49 79 7a 73 35 70 39 52 6b 71 65 55 43 64 4b 73 38 4a 44 2f 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: 8Iyzs5p9RkqeUCdKs8JD/Q.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  4192.168.2.65036640.113.110.67443
                                  TimestampBytes transferredDirectionData
                                  2025-01-15 13:07:09 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 37 65 75 55 67 75 71 39 75 30 47 33 6e 46 34 45 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 61 33 66 38 33 65 38 37 38 31 65 36 34 61 65 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: 7euUguq9u0G3nF4E.1Context: aa3f83e8781e64ae
                                  2025-01-15 13:07:09 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-15 13:07:09 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 37 65 75 55 67 75 71 39 75 30 47 33 6e 46 34 45 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 61 33 66 38 33 65 38 37 38 31 65 36 34 61 65 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 58 70 7a 35 30 2b 54 37 73 30 33 7a 32 35 71 50 79 77 6e 32 37 79 39 75 66 32 38 77 43 75 64 74 6b 66 42 42 50 39 45 52 4c 77 49 77 71 4c 59 76 76 53 32 41 4d 33 77 61 6e 37 59 46 75 2f 59 66 2b 47 6f 34 46 31 77 50 4c 62 33 70 63 79 2f 7a 46 62 44 43 64 62 56 31 44 30 45 66 69 4e 5a 59 4d 6c 77 4f 2b 61 45 53 6f 35 65 6a 57
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 7euUguq9u0G3nF4E.2Context: aa3f83e8781e64ae<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAXpz50+T7s03z25qPywn27y9uf28wCudtkfBBP9ERLwIwqLYvvS2AM3wan7YFu/Yf+Go4F1wPLb3pcy/zFbDCdbV1D0EfiNZYMlwO+aESo5ejW
                                  2025-01-15 13:07:09 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 37 65 75 55 67 75 71 39 75 30 47 33 6e 46 34 45 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 61 33 66 38 33 65 38 37 38 31 65 36 34 61 65 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: 7euUguq9u0G3nF4E.3Context: aa3f83e8781e64ae<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-15 13:07:09 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-15 13:07:09 UTC58INData Raw: 4d 53 2d 43 56 3a 20 55 6f 7a 48 71 6f 6b 4a 7a 30 79 35 56 6b 62 39 39 67 39 63 6f 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: UozHqokJz0y5Vkb99g9coQ.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  5192.168.2.65062140.113.110.67443
                                  TimestampBytes transferredDirectionData
                                  2025-01-15 13:07:41 UTC70OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 34 0d 0a 4d 53 2d 43 56 3a 20 4d 6e 42 2f 42 78 49 31 4b 30 65 74 67 79 46 4a 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 63 61 33 63 31 30 34 30 32 63 64 61 32 61 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 304MS-CV: MnB/BxI1K0etgyFJ.1Context: aca3c10402cda2a
                                  2025-01-15 13:07:41 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-15 13:07:41 UTC1083OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 30 0d 0a 4d 53 2d 43 56 3a 20 4d 6e 42 2f 42 78 49 31 4b 30 65 74 67 79 46 4a 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 63 61 33 63 31 30 34 30 32 63 64 61 32 61 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 58 70 7a 35 30 2b 54 37 73 30 33 7a 32 35 71 50 79 77 6e 32 37 79 39 75 66 32 38 77 43 75 64 74 6b 66 42 42 50 39 45 52 4c 77 49 77 71 4c 59 76 76 53 32 41 4d 33 77 61 6e 37 59 46 75 2f 59 66 2b 47 6f 34 46 31 77 50 4c 62 33 70 63 79 2f 7a 46 62 44 43 64 62 56 31 44 30 45 66 69 4e 5a 59 4d 6c 77 4f 2b 61 45 53 6f 35 65 6a 57 65
                                  Data Ascii: ATH 2 CON\DEVICE 1060MS-CV: MnB/BxI1K0etgyFJ.2Context: aca3c10402cda2a<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAXpz50+T7s03z25qPywn27y9uf28wCudtkfBBP9ERLwIwqLYvvS2AM3wan7YFu/Yf+Go4F1wPLb3pcy/zFbDCdbV1D0EfiNZYMlwO+aESo5ejWe
                                  2025-01-15 13:07:41 UTC217OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 36 0d 0a 4d 53 2d 43 56 3a 20 4d 6e 42 2f 42 78 49 31 4b 30 65 74 67 79 46 4a 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 63 61 33 63 31 30 34 30 32 63 64 61 32 61 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 196MS-CV: MnB/BxI1K0etgyFJ.3Context: aca3c10402cda2a<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-15 13:07:41 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-15 13:07:41 UTC58INData Raw: 4d 53 2d 43 56 3a 20 39 51 6e 46 72 34 6d 72 5a 45 43 7a 57 43 55 4f 4d 68 41 7a 70 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: 9QnFr4mrZECzWCUOMhAzpQ.0Payload parsing failed.


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:08:06:12
                                  Start date:15/01/2025
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll"
                                  Imagebase:0x410000
                                  File size:126'464 bytes
                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:1
                                  Start time:08:06:13
                                  Start date:15/01/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff66e660000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:08:06:13
                                  Start date:15/01/2025
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1
                                  Imagebase:0x1c0000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:08:06:13
                                  Start date:15/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\NZZ71x6Cyz.dll,PlayGame
                                  Imagebase:0xcc0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:08:06:13
                                  Start date:15/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",#1
                                  Imagebase:0xcc0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:08:06:13
                                  Start date:15/01/2025
                                  Path:C:\Windows\mssecsvc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvc.exe
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:1766D9D4769580C0FAB9E6AD5BF73436
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2232766109.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2232907236.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2232907236.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 97%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:08:06:14
                                  Start date:15/01/2025
                                  Path:C:\Windows\mssecsvc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:1766D9D4769580C0FAB9E6AD5BF73436
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2246993407.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2893277136.00000000024F5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2893277136.00000000024F5000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2247134068.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2247134068.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2893040296.0000000001FC6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2893040296.0000000001FC6000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:08:06:15
                                  Start date:15/01/2025
                                  Path:C:\Windows\tasksche.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                  Imagebase:0x400000
                                  File size:3'514'368 bytes
                                  MD5 hash:747CD55009BDBB466A01BD7214FCE79D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.2256769702.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 95%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:10
                                  Start time:08:06:16
                                  Start date:15/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\NZZ71x6Cyz.dll",PlayGame
                                  Imagebase:0xcc0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:08:06:16
                                  Start date:15/01/2025
                                  Path:C:\Windows\mssecsvc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvc.exe
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:1766D9D4769580C0FAB9E6AD5BF73436
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.2260476677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.2260476677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.2268397761.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.2268397761.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.2260317441.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.2268262779.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:12
                                  Start time:08:06:16
                                  Start date:15/01/2025
                                  Path:C:\Windows\tasksche.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                  Imagebase:0x400000
                                  File size:3'514'368 bytes
                                  MD5 hash:747CD55009BDBB466A01BD7214FCE79D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.2267479178.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.2267848816.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:71.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:63.2%
                                    Total number of Nodes:38
                                    Total number of Limit Nodes:9
                                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FA10EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                    • CreateProcessA.KERNELBASE ref: 00407EE8
                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2257622985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2257578279.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257659166.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257753541.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4281112323-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2257622985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2257578279.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257659166.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257753541.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2257622985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2257578279.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257659166.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257753541.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    • API String ID: 774561529-2942426231
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FA10EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2257622985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2257578279.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257659166.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257753541.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                    • API String ID: 3340711343-4063779371
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FA10EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2257622985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2257578279.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257659166.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257683259.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257753541.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2257844589.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.0
                                    • API String ID: 4274534310-3729025388
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Execution Graph

                                    Execution Coverage:34.8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:36
                                    Total number of Limit Nodes:2

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FA10EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2892167343.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2892148012.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892190582.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892266826.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892281633.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.0
                                    • API String ID: 4274534310-3729025388
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2892167343.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2892148012.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892190582.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892266826.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892281633.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    • API String ID: 774561529-2942426231
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FA10EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2892167343.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2892148012.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892190582.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892266826.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892281633.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                    • API String ID: 3340711343-4063779371
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FA10EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2892167343.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2892148012.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892190582.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892266826.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892281633.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4072214828-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2892167343.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2892148012.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892190582.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892205109.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892250479.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892266826.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892281633.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2892373409.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                    APIs
                                    • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: /../$/..\$\../$\..\
                                    • API String ID: 3510742995-3885502717
                                    • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                    • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                    • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                    • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                    APIs
                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                    • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                    • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                    • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                    • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                    • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                    • API String ID: 2238633743-2459060434
                                    • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                    • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                    • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                    • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                    APIs
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                    • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$ManagerStart
                                    • String ID: cmd.exe /c "%s"
                                    • API String ID: 1485051382-955883872
                                    • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                    • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                    • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                    • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                    • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                    • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow$memcpy
                                    • String ID:
                                    • API String ID: 1881450474-3916222277
                                    • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                    • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                    • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                    • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                    • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                    • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                    • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                    • String ID: WANACRY!
                                    • API String ID: 283026544-1240840912
                                    • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                    • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                    • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                    • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID: $Q;@
                                    • API String ID: 2382887404-262343263
                                    • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                    • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                    • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                    • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID:
                                    • API String ID: 2382887404-3916222277
                                    • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                    • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                    • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                    • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                    APIs
                                    • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$FreeProcessfree
                                    • String ID:
                                    • API String ID: 3428986607-0
                                    • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                    • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                    • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                    • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow
                                    • String ID:
                                    • API String ID: 941485209-0
                                    • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                    • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                    • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                    • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow
                                    • String ID:
                                    • API String ID: 941485209-0
                                    • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                    • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                    • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                    • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                    • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                    • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                    • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                    APIs
                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ContextCryptRelease
                                    • String ID:
                                    • API String ID: 829835001-0
                                    • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                    • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                    • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                    • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                    • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                    • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                    • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                    • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                    • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                    • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                    APIs
                                      • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                    • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                    • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                    • API String ID: 2238633743-1294736154
                                    • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                    • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                    • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                    • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %s%s$%s%s%s$:$\
                                    • API String ID: 0-1100577047
                                    • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                    • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                    • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                    • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                    APIs
                                    • __p___argv.MSVCRT(0040F538), ref: 00402040
                                    • strcmp.MSVCRT(?), ref: 0040204B
                                    • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                    • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                      • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                    • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                    • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                    • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                      • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                    • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                    • API String ID: 1074704982-2844324180
                                    • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                    • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                    • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                    • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                    APIs
                                    • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                    • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                    • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                    • strlen.MSVCRT(?), ref: 004011A7
                                    • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                    • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                    • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                    • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                    • String ID: 0@$Software\$WanaCrypt0r
                                    • API String ID: 865909632-3421300005
                                    • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                    • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                    • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                    • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                    • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                    • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                    • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                    • String ID: %s\Intel$%s\ProgramData
                                    • API String ID: 3806094219-198707228
                                    • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                    • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                    • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                    • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                    APIs
                                      • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                    • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                    • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                    • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                      • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                    • SetLastError.KERNEL32(0000045A), ref: 00402430
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                    • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                    • API String ID: 1900561814-3657104962
                                    • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                    • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                    • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                    • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                    APIs
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                    • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                    • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                    • String ID: %s\%s
                                    • API String ID: 1036847564-4073750446
                                    • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                    • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                    • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                    • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                    APIs
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                    • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                    • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                    • CloseHandle.KERNEL32(?), ref: 004010EC
                                    • CloseHandle.KERNEL32(?), ref: 004010F1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                    • String ID: D
                                    • API String ID: 786732093-2746444292
                                    • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                    • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                    • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                    • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                    APIs
                                    • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                    • __p__fmode.MSVCRT ref: 004077FC
                                    • __p__commode.MSVCRT ref: 0040780A
                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                    • String ID:
                                    • API String ID: 3626615345-0
                                    • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                    • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                    • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                    • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                    APIs
                                    • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                      • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                    • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                    • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                    • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                    • String ID:
                                    • API String ID: 2141228402-0
                                    • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                    • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                    • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                    • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                    APIs
                                    • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                    • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                    • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Read$realloc
                                    • String ID: ?!@
                                    • API String ID: 1241503663-708128716
                                    • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                    • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                    • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                    • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: rand$wcslen$ComputerNamesrand
                                    • String ID:
                                    • API String ID: 3058258771-0
                                    • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                    • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                    • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                    • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                    APIs
                                    • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                    • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                    • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                    • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                    • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                    • String ID:
                                    • API String ID: 2935503933-0
                                    • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                    • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                    • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                    • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                    APIs
                                    • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                    • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                    • Sleep.KERNEL32(000003E8), ref: 00401F40
                                    • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleMutexOpenSleepsprintf
                                    • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                    • API String ID: 2780352083-2959021817
                                    • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                    • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                    • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                    • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID:
                                    • API String ID: 2382887404-0
                                    • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                    • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                    • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                    • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                    APIs
                                    • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                    • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                    • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                    • fclose.MSVCRT(00000000), ref: 00401058
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: fclosefopenfreadfwrite
                                    • String ID: c.wnry
                                    • API String ID: 4000964834-3240288721
                                    • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                    • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                    • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                    • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                    • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                    • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                    • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                    • String ID:
                                    • API String ID: 2811923685-0
                                    • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                    • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                    • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                    • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                    APIs
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Pointer$??2@Create
                                    • String ID:
                                    • API String ID: 1331958074-0
                                    • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                    • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                    • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                    • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                    APIs
                                    • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                    • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_stricmp
                                    • String ID: P!@
                                    • API String ID: 1278613211-1774101457
                                    • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                    • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                    • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                    • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                    APIs
                                    • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                    • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AttributesFilestrcmp
                                    • String ID: c.wnry
                                    • API String ID: 3324900478-3240288721
                                    • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                    • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                    • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                    • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                    APIs
                                    • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??3@CloseHandle
                                    • String ID: $l@
                                    • API String ID: 3816424416-2140230165
                                    • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                    • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                    • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                    • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                    • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.2257160870.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.2257140215.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257181504.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257201978.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.2257221493.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Entermemcpy
                                    • String ID:
                                    • API String ID: 3435569088-0
                                    • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                    • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                    • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                    • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65