Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
k6fBkyS1R6.dll

Overview

General Information

Sample name:k6fBkyS1R6.dll
renamed because original name is a hash value
Original sample name:1d6958990c8c4f5b9b93efa692b84937.dll
Analysis ID:1591260
MD5:1d6958990c8c4f5b9b93efa692b84937
SHA1:58bc6052ee6a13dc4711ca73df029a694f6e7239
SHA256:716954bdf4ef6882a71c8f2aa3981190da7777b50a3988069bb68eed17c7ddc8
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3032 cmdline: loaddll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5552 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4932 cmdline: rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7048 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 53E887584F552941244D293433ED9F30)
          • tasksche.exe (PID: 2740 cmdline: C:\WINDOWS\tasksche.exe /i MD5: FAE2EB3636050E9697B9B8DDDB47E1CA)
    • rundll32.exe (PID: 6004 cmdline: rundll32.exe C:\Users\user\Desktop\k6fBkyS1R6.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1436 cmdline: rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 4612 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 53E887584F552941244D293433ED9F30)
        • tasksche.exe (PID: 1796 cmdline: C:\WINDOWS\tasksche.exe /i MD5: FAE2EB3636050E9697B9B8DDDB47E1CA)
  • mssecsvc.exe (PID: 5852 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 53E887584F552941244D293433ED9F30)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
k6fBkyS1R6.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    k6fBkyS1R6.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    k6fBkyS1R6.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000B.00000002.1521308563.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.1eb9084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvc.exe.23e98c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              6.0.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                6.0.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                6.0.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 135 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.703851+010020315153Misc activity104.16.167.22880192.168.2.849704TCP
                2025-01-14T20:57:18.171861+010020315153Misc activity104.16.167.22880192.168.2.849705TCP
                2025-01-14T20:57:18.953281+010020315153Misc activity104.16.167.22880192.168.2.849714TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.155263+010020242911A Network Trojan was detected192.168.2.8595421.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.680047+010020242981A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T20:57:18.171270+010020242981A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T20:57:18.952400+010020242981A Network Trojan was detected192.168.2.849714104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.680047+010020242991A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T20:57:18.171270+010020242991A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T20:57:18.952400+010020242991A Network Trojan was detected192.168.2.849714104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.680047+010020243011A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T20:57:18.171270+010020243011A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T20:57:18.952400+010020243011A Network Trojan was detected192.168.2.849714104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.680047+010020243021A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T20:57:18.171270+010020243021A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T20:57:18.952400+010020243021A Network Trojan was detected192.168.2.849714104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T20:57:16.680047+010028033043Unknown Traffic192.168.2.849704104.16.167.22880TCP
                2025-01-14T20:57:18.171270+010028033043Unknown Traffic192.168.2.849705104.16.167.22880TCP
                2025-01-14T20:57:18.952400+010028033043Unknown Traffic192.168.2.849714104.16.167.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: k6fBkyS1R6.dllAvira: detected
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 96%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 96%
                Source: k6fBkyS1R6.dllVirustotal: Detection: 88%Perma Link
                Source: k6fBkyS1R6.dllReversingLabs: Detection: 94%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: k6fBkyS1R6.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 10_2_004018B9 CryptReleaseContext,10_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: k6fBkyS1R6.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49714 -> 104.16.167.228:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:57:16 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902031b2bd96430f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:57:18 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902031bbdcf40f8d-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:57:18 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902031c10fff72ad-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49704
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:59542 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49705
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49714
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.126
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.126
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.126
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.126
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 160.166.147.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.36
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.36
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.36
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.36
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.42.227.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.185
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.185
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.185
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.185
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 9.81.42.1
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.150
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.150
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.150
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.1
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.1
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.150
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.1
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.1
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.1
                Source: unknownTCP traffic detected without corresponding DNS query: 60.237.150.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: k6fBkyS1R6.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe, 00000006.00000002.1514441189.0000000000C30000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1514441189.0000000000C41000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                Source: mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/%
                Source: mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                Source: mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/4
                Source: mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8
                Source: mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/_
                Source: mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/d
                Source: mssecsvc.exe, 00000006.00000002.1514441189.0000000000C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/zD
                Source: mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com7
                Source: mssecsvc.exe, 00000008.00000002.2147379180.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                Source: mssecsvc.exe, 00000006.00000002.1514441189.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000DA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!10_2_004014A6
                Source: Yara matchFile source: k6fBkyS1R6.dll, type: SAMPLE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23e98c8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ec8104.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23f8948.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ec40a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23f48e8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1521308563.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1512513214.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1521464297.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1500069157.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2148895051.0000000001EC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2149290040.00000000023F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1500365419.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1483963357.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1484233994.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7048, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5852, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4612, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: k6fBkyS1R6.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: k6fBkyS1R6.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1eb9084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e98c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23e98c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e98c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ec8104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ec8104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23f8948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23f8948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ec40a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ec40a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23f48e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23f48e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000000.1512413486.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.1521464297.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.1520311924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.1520794721.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2148895051.0000000001EC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2149290040.00000000023F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1500365419.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1484233994.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 10_2_00406C4010_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 10_2_00402A7610_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 10_2_00402E7E10_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 10_2_0040350F10_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 10_2_00404C1910_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 10_2_0040541F10_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 10_2_0040379710_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 10_2_004043B710_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 10_2_004031BC10_2_004031BC
                Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: k6fBkyS1R6.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: k6fBkyS1R6.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: k6fBkyS1R6.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1eb9084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e98c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1eeb128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1ec8104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.23f8948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.241b96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.241b96c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1eeb128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23e98c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e98c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1eb9084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ec8104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ec8104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23f8948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23f8948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ec40a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ec40a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23f48e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23f48e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000000.1512413486.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.1521464297.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.1520311924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.1520794721.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2148895051.0000000001EC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2149290040.00000000023F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1500365419.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1484233994.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\temp\%`U{B@O4]`FD_8Q(QKA0{DN.tmp
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\temp\E)X(~RRA8CA$S}FEWQSWITV.tmp0p
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume1\Users\HI\AppData\Roaming\Microsoft\Windows\Printer Shortcutsip
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\cscript.exe|p
                Source: tasksche.exe.6.drBinary string: z\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\UsrClass.dat{f12e20d1-a951-11e6-a653-dc4a3e4fef99}.TM.blfg
                Source: tasksche.exe.6.drBinary string: \Device\Mup\nethd\any\
                Source: tasksche.exe.6.drBinary string: M\Device\HarddiskVolume1\Drivers\Board.Intel\M\IaStor[14.8.0.1042]\iaAHCIC.infp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\provsvc.dll.
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\sgim_url_usr.binainp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\System32\zh-CN\nlasvc.dll.muip
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\LEELAWDB.TTF|
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\History\desktop.ini>
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20108.NLSt
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20284.NLS
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\vbscript.dllp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\d3d11.dll
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume1\Windows\inf\ESENT\0804
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\wlanutil.dllp
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume1\Windows\explorer.exe p
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Drivers\Board.Intel\MEI\9\x86
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Help\doc\clear.reg?
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\inf\RemoteAccess\0409
                Source: tasksche.exe.6.drBinary string: 3\Device\Mup\nethd\any\Program Files\/T
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\igfxHK.exe
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_28598.NLS
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Windows\System32\catroot2\edb.logh
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\CalibriL.ttf
                Source: tasksche.exe.6.drBinary string: ;\Device\Mup\nethd\any\Program Files\Autoshut\Autoshut55.exen p
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\symbol.ttf
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20108.NLS
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume1\Windows\Microsoft.NET\Framework\v3.0\WPF\zh-CNx
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_850.NLSler
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\keyboard.inf
                Source: tasksche.exe.6.drBinary string: w\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\input.inf_x86_neutral_9e1eba5724be176f\hidclass.sys|?p
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_28593.NLS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\tahomabd.ttf
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\Fonts\JianPu Bold.ttf
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Drivers\Board.Intel\C\All_10.1.1.5002p
                Source: tasksche.exe.6.drBinary string: \Device\Mup\.\.\v
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\opengl32.dllp
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Windows\inf\Windows Workflow Foundation 3.0.0.0\0804a
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY.users\acc.dats
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\temp\[A0`9[LSMC3~DM6RX25U1GA.tmph
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume1\Users\HI\IntelGraphicsProfiles\Enhance Video Colors.man.igpi
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\System32\zh-CN\sndvolsso.dll.mui
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1026.NLS
                Source: tasksche.exe.6.drBinary string: W\Device\HarddiskVolume1\Windows\System32\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}p
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAROG.infp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1047.NLSnf
                Source: tasksche.exe.6.drBinary string: _\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\System Volume Information\Syscache.hve
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\batmeter.dllp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\Fonts\SEGOEUISL.TTF
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\Fonts\estre.ttf
                Source: tasksche.exe.6.drBinary string: [\Device\HarddiskVolume1\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\prcp.nlpp
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume1\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs<>>|p
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_x86_be3388afa6a748e8d34a9f7246d70918c5f44bc_0ea098c5
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\Stcaiyun.ttf
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\msxml6.dll
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1140.NLSwe
                Source: tasksche.exe.6.drBinary string: C\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAMSIESS.inf
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_870.NLSble
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\AltTab.dll
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\oleaccrc.dll.mui
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\kernel32.dll.muiI p
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1258.NLS
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\temp\4S[S)K$VUJX6E`Y[38KGAPL.tmp
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume1\Windows\System32\DriverStore\zh-CN\msmouse.inf_locp
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\zh-CN\regedit.exe.muip
                Source: tasksche.exe.6.drBinary string: z\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\oemsetup.inf_x86_neutral_c5bddb64fdeed852\oemsetup.inf
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAMSSExtDsp.infn
                Source: tasksche.exe.6.drBinary string: B\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDASRSSV.inf
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Drivers\Board.Intel\C\All_10.1.1.5002\sunrisepoint-h
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_437.NLStio
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1255.NLSBp
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume1\Program Files\SogouInput\8.0.0.8083\sgim_core.binp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20004.NLSm
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\assembly\GAC_MSIL\PresentationCore.resources\3.0.0.0_zh-CHS_31bf3856ad364e35\PresentationCore.resources.dll
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\Fonts\times.ttfH
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20285.NLS
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume1\Windows\inf\.NETFramework\0804
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume1\Program Files\SogouInput\Components
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\FXSMON.dll
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Drivers\Audio.Intel\4\IntcDAud.inf
                Source: tasksche.exe.6.drBinary string: _\Device\HarddiskVolume1\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.datrt
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\eappcfg.dll"
                Source: tasksche.exe.6.drBinary string: O\Device\HarddiskVolume1\Program Files\SogouInput\Components\ComponentConfig.inidep
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDASRSS.inf
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Users\HI\AppData\Local\Temp\xpluna.ini
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1_for_KB2529073~31bf3856ad364e35~x86~~6.1.1.1.cat
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Drivers\Board.Intel\M\IaStor[14.8.0.1042]
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v2.0.50727_32\PresentationCore\14a87218ea49639f38097e278b98a3da\PresentationCore.ni.dllp
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Users\HI\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\win32spl.dll.muip
                Source: tasksche.exe.6.drBinary string: )\Device\HarddiskVolume1\Windows\inf\en-US
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume1\Windows\inf\ServiceModelService 3.0.0.0\0804
                Source: tasksche.exe.6.drBinary string: Z\Device\HarddiskVolume1\Drivers\Board.Intel\C\All_10.1.1.5002\skylake\SkylakeSystemGMM.inf
                Source: tasksche.exe.6.drBinary string: +\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\MTCORSVA.TTF
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\FntCache.dllp
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\wbem\textvaluelist.xsl
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\tahomabd.ttfo
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\System32\zh-CN\mlang.dll.mui~p
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20107.NLS
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Windows\System32\WMALFXGFXDSP.dllp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\System32\drivers\rminiv3.sys
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\System32\sppc.dllp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\Gabriola.ttf
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\Fonts\Fzytk.ttf
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Drivers\Board.Intel\MEI\9\heci.inf
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume1\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs:
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Startupp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10021.NLS
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\cabinet.dll.
                Source: tasksche.exe.6.drBinary string: w\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\input.inf_x86_neutral_9e1eba5724be176f\hidparse.sys|p
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDASBCH.infp
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Foundation-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
                Source: tasksche.exe.6.drBinary string: a\Device\HarddiskVolume1\Windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3ap
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\scrobj.dllp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\glu32.dll!
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Program Files\Windows Media Player\wmplayer.exe?
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\simhei.ttfm
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\wsearchidxpio
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20278.NLS
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\wsearchidxpil
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Users\HI\AppData\Local\Temp
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume1\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10079.NLS
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume1\Windows\System32\zh-CN\explorerframe.dll.muid$p
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAFTS.inf
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Program Files\SogouInput\8.0.0.8083\sgim_phrases.binp
                Source: tasksche.exe.6.drBinary string: q\Device\HarddiskVolume1\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPOBJS.DLLp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20871.NLS
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\Fonts\arial.ttf
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\wsearchidxpia
                Source: tasksche.exe.6.drBinary string: C\Device\HarddiskVolume1\Windows\System32\zh-CN\DeviceCenter.dll.mui
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_28596.NLS
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Windows\System32\zh-CN\devenum.dll.mui
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10000.NLSr
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_860.NLSpat
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\System32\mfds.dllp
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume1\Windows\System32\DriverStore\zh-CN\input.inf_locp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20290.NLSn
                Source: tasksche.exe.6.drBinary string: +\Device\HarddiskVolume1\Users\Public\Videos
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1257.NLS
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume1\Program Files\Microsoft Office\Office15\OSPP.VBSE
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume1\Windows\System32\DriverStore\zh-CN\input.inf_lock
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\WWanAPI.dllrp
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume1\Users\Public\Pictures
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\punctures.inin p
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\WINGDNG2.TTFE3
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10008.NLS
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume1\Program Files\SogouInput\8.0.0.8083 Up
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\sgim_del_word.bin
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume1\Windows\inf\.NET Data Provider for SqlServer\0000
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Media-Format-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\inf\hidserv.inf
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\mscoree.dll
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20936.NLS
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1145.NLSDi
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\inf\RemoteAccess\0804
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\wsearchidxpi~
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\Burn\Burn
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\System32\zh-CN\mmres.dll.muip
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20290.NLS
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Windows\System32\DeviceCenter.dllp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\CalibriL.ttfE
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\System32\onex.dllp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\sppwmi.dll
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_869.NLS
                Source: tasksche.exe.6.drBinary string: l\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_neutral_88459cb66b0e2d44
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\AppPatch\AcLayers.dllp
                Source: tasksche.exe.6.drBinary string: E\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\WER\ReportQueuep
                Source: tasksche.exe.6.drBinary string: C\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAMSSDS1.inf
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\System32\wbem\xml\wmi2xml.dllp
                Source: tasksche.exe.6.drBinary string: &\Device\Mup\nethd\any\Program Files\/T
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\System32\d3d9.dllp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20106.NLS
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\userinit.exe.muip
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10005.NLS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\MSUIGHUR.TTF
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume1\Windows\inf\.NET Data Provider for SqlServer\0804p
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\sgim_fix_first.binlp
                Source: tasksche.exe.6.drBinary string: \Device\Harddisk0\DR0
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\inf\UGatherer\0000
                Source: tasksche.exe.6.drBinary string: R\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\EditPlus
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\MSYHBD.TTC;
                Source: tasksche.exe.6.drBinary string: c\Device\HarddiskVolume1\Windows\System32\SRSLabs\{176F4E15-8F7C-4833-ADED-81FAE8CCD186}\slgeq32.dlls
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10081.NLSa
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\Stxihei.ttf
                Source: tasksche.exe.6.drBinary string: Z\Device\HarddiskVolume1\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\REFSPCL.TTF
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1141.NLS
                Source: tasksche.exe.6.drBinary string: d\Device\HarddiskVolume1\Windows\System32\SRSLabs\{176F4E15-8F7C-4833-ADED-81FAE8CCD186}\slh36032.dll
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Windows\System32\zh-CN\pnrpnsp.dll.mui
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Program Files\PotPlayer
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume1\Users\HI\IntelGraphicsProfiles4 Mp
                Source: tasksche.exe.6.drBinary string: w\Device\HarddiskVolume1\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0p
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume1\Windows\System32\msmpeg2adec.dll
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Help\doc\page.exep
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_861.NLSn N
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\BOOKOSB.TTF
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDADELL.inf
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Intel\gp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_857.NLSing
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-OfflineFiles-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\Simyou.ttf
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume1\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\linkinfo.dllp
                Source: tasksche.exe.6.drBinary string: +\Device\HarddiskVolume1\Windows\System32\ener
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume1\Windows\inf\.NETFramework\0804>
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20277.NLS
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\mfplat.dll
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Windows\inf\Windows Workflow Foundation 3.0.0.0\0000
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_28595.NLS
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: x\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_neutral_88459cb66b0e2d44\ntprint.inf
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\ARIALN.TTF
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\Microsoft.NET\Framework\v3.0p
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\inf\.NET CLR Networking\0804
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_865.NLS<{
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\winsxs\Manifests\x86_policy.8.0.microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_516d712b0f495a45.manifestp
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\wlanapi.dllip
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\~
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1256.NLS
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareProtectionPlatform\Cache\cache.dat|
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\keyboard.PNF
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_932.NLS|
                Source: tasksche.exe.6.drBinary string: B\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAHPbNB.inf
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\security.dllp
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_75_for_KB2661254~31bf3856ad364e35~x86~~6.1.1.3.cat$x
                Source: tasksche.exe.6.drBinary string: ;\Device\Mup\nethd\any\Program Files\Autoshut\Autoshut55.exe
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\l_intl.nls
                Source: tasksche.exe.6.drBinary string: c\Device\HarddiskVolume1\Windows\System32\SRSLabs\{176F4E15-8F7C-4833-ADED-81FAE8CCD186}\slviq32.dll|p
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Windows\inf\Windows Workflow Foundation 3.0.0.0p
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\Fonts\
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10007.NLS
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume1\Windows\Fonts\Cambria(lQ
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache-S-1-5-21-3698138953-2470169120-1555830818-1000-12288.datp
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\C_G18030.DLL
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\msacm32.dll.p
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\ANTQUAI.TTF
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_ISCII.DLLi
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\LEELAWAD.TTF
                Source: tasksche.exe.6.drBinary string: $\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\inf\.NET CLR Data
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10006.NLS
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\System32\zh-CN\rasdlg.dll.muip
                Source: tasksche.exe.6.drBinary string: &\Device\HarddiskVolume1\Windows\plug.aslo
                Source: tasksche.exe.6.drBinary string: ]\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\Tar7F0F.tmph
                Source: tasksche.exe.6.drBinary string: i\Device\HarddiskVolume1\Drivers\Board.Intel\C\All_10.1.1.5002\sunrisepoint-h\SunrisePoint-HSystemLPSS.inf.
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume1\Windows\inf\ESENT\0000
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\PJLMON.DLLI
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Windows\inf\SMSvcHost 3.0.0.0\0000<22
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\REFSAN.TTF
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\xwizards.dllp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_ISCII.DLL
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Users\HI\IntelGraphicsProfiles\Darken Video.man.igpi
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_x86_a4d465942a759bdca6a5478d3d5228cb8fea_cab_0ea08268\Report.werp
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Users\Public\Desktop\PotPlayer.lnk
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume1\Drivers\Board.Intel\MEI\9\mesrl.infp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1026.NLSpr
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20105.NLS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_949.NLS?
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Windows\Fonts\DEPUOMR_Bubbles.ttf
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\dinotify.exe.muiH
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\inf\usbhub\0804.
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Users\Public\Desktop\PowerPoint 2013.lnk
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\simkai.ttf
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_zh-cn_6189e316803d96d4\comctl32.dll.mui
                Source: tasksche.exe.6.drBinary string: B\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\temp\086X9Q[ILAD_%5T3VLS[[[V.tmp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1140.NLS
                Source: tasksche.exe.6.drBinary string: R\Device\HarddiskVolume1\Program Files\DVDFab Virtual Drive\Language\VDRIVE_CHS.lngD
                Source: tasksche.exe.6.drBinary string: d\Device\HarddiskVolume1\Windows\System32\SRSLabs\{176F4E15-8F7C-4833-ADED-81FAE8CCD186}\slcsii32.dll0
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\inf\usbhub\0000nb
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume1\Program Files\Common Files\microsoft shared\EQUATION\MTEXTRA.TTF
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDARDC.infp
                Source: tasksche.exe.6.drBinary string: )\Device\HarddiskVolume1\Windows\inf\zh-CNp
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\temp\[A0`9[LSMC3~DM6RX25U1GA.tmp
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\inf\usbhub\0000~
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\WSDMon.dllp
                Source: tasksche.exe.6.drBinary string: z\Device\HarddiskVolume1\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Users\HI\AppData\Roaming\feiq\feiq.ini
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Program Files\PotPlayer\PotIcons.dll
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\imapi2.dllW
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDALVJ.inf
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Program Files\QQPlayer\Microsoft.VC80.MFC.manifest
                Source: tasksche.exe.6.drBinary string: `\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\phzxstarup.bat p
                Source: tasksche.exe.6.drBinary string: P\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\WER\ReportQueueh
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\wbem\Logsen p
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume1\Drivers\Video.Intel5
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\System32\zh-CN\AltTab.dll.muip
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\NIRMALAB.TTF
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume1\$RECYCLE.BIN\S-1-5-21-3698138953-2470169120-1555830818-1000
                Source: tasksche.exe.6.drBinary string: !\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\bthprops.cpl.mui
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Windows\System32\zh-CN\cscript.exe.mui
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\System32\ureg.dllp
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\GADUGIB.TTF
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume1\Windows\Microsoft.NET\Framework\v3.0\WPF\wpfgfx_v0300.dllp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\xwtpw32.dll.
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1255.NLS
                Source: tasksche.exe.6.drBinary string: $\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Crypto\RSA\MachineKeys\3d50955025fafb9c99f9aa014a2f5ec9_aa664d84-59ea-4cb9-b49d-02f01163415d
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\wlanhlp.dllrp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20001.NLS
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\sppcext.dll
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Program Files\SogouInput\8.0.0.8083\sgim_hz.bin
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\System32\zh-CN\pnidui.dll.muip
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\simsunb.ttf
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\riched32.dllp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10082.NLS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\FXSST.dll
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\arialbd.ttf
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\System32\zh-CN\sppsvc.exe.muip
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\Prefetch\ReadyBoot\Trace1.fx
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_860.NLS
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\PERFLIB\0409
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\$BitMapxxp
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Windows\System32\DriverStore\drvindex.datp
                Source: tasksche.exe.6.drBinary string: e\Device\HarddiskVolume2\temp\Temporary Internet Files\Content.IE5\SWXBPYR2\update_check_vdrive[1].inip
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume1\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10001.NLSc
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\ddraw.dll>p
                Source: tasksche.exe.6.drBinary string: ]\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\Tar7F0F.tmp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20273.NLS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_437.NLS>
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\midimap.dllvp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10001.NLS<<
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Windows\System32\catroot2\edb.chk
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\c_28603.nls
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\dciman32.dllp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_950.NLS
                Source: tasksche.exe.6.drBinary string: &\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: )\Device\HarddiskVolume1\Windows\inf\zh-CNJ
                Source: tasksche.exe.6.drBinary string: m\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\prnms002.inf_x86_neutral_baa1493e6380688bJ
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Users\HI\AppData\Local\Temp\WPDNSE>
                Source: tasksche.exe.6.drBinary string: h\Device\HarddiskVolume1\Drivers\Board.Intel\C\All_10.1.1.5002\sunrisepoint-h\SunrisePoint-HSystemISH.inf(
                Source: tasksche.exe.6.drBinary string: \Device\Mup\nethd\any\!
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_852.NLS
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10017.NLSp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20127.NLS
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume1\Windows\inf\rdyboost|
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Windows\Fonts\DEPUOMR_Bracket.ttf
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume1\Windows\System32\ras
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10010.NLS
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDASRSA.inf
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Users\Public\Desktop\PhotoLine.lnk
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\WER\ReportArchiver
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\inf\TermService\0000
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume1\Program Files\SogouInput\8.0.0.8083\SGTool.exe
                Source: tasksche.exe.6.drBinary string: B\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDASony2.inf
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume1\Windows\inf\BITS\0804
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDACR.inf3
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\Prefetch\AgGlFaultHistory.db
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume1\Windows\System32\msmpeg2vdec.dllsp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\WINGDNG3.TTF
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\InputStaticstics.dat.sgbak
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_21025.NLS
                Source: tasksche.exe.6.drBinary string: %\Device\HarddiskVolume1\Windows\Media
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\msls31.dll
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume1\Windows\inf\.NETFramework\0000
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\System32\evr.dllp
                Source: tasksche.exe.6.drBinary string: R\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\WER\ReportArchive
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20005.NLSx
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\winsxs\Manifests\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc.manifest
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\glu32.dlltivp
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume1\Program Files\WinRAR\WinRAR.exe
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\System32\WPDShServiceObj.dll
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Users\HI\AppData\Local\Temp\WPDNSE|
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1254.NLS
                Source: tasksche.exe.6.drBinary string: )\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: -\Device\Mup\nethd\any\Program Files\/T
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10021.NLSr
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume1\Users\HI\AppData\Roaming\Microsoft\Installerp
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\inf\usbhub\0804
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume1\Users\Public\Desktop\
                Source: tasksche.exe.6.drBinary string: *\Device\HarddiskVolume1\Users\Public\Music
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_861.NLS
                Source: tasksche.exe.6.drBinary string: {\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\Certificatesnn<
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\System32\mf.dll>
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume1\Windows\System32\PortableDeviceTypes.dll
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume1\Windows\inf\ServiceModelService 3.0.0.0\0000
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume1\Users\Public\Desktop\EditPlus.lnkp
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Windows\Prefetch\PfSvPerfStats.bin
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume1\Windows\System32\DriverStore\zh-CN\usb.inf_loc>
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20949.NLS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Help\doc\clear.reg
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\slwga.dll
                Source: tasksche.exe.6.drBinary string: *\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\sppobjs.dll
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\simhei.ttf
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\PNRPSvc\0804
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Program Files\Windows Media Player\wmplayer.exe
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_866.NLS
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\pnidui.dll
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDADELL.infp
                Source: tasksche.exe.6.drBinary string: _\Device\HarddiskVolume1\$RECYCLE.BIN\S-1-5-21-3698138953-2470169120-1555830818-1000\desktop.ini
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\sgim_eng_usr.bin(pap
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Intel\gp\profile_HI.dat>>
                Source: tasksche.exe.6.drBinary string: (\Device\HarddiskVolume1\Windows\calc.exe|
                Source: tasksche.exe.6.drBinary string: *\Device\HarddiskVolume2\Program Files\feiq
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\schedcli.dllp
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume1\Windows\Fonts\GARA.TTF
                Source: tasksche.exe.6.drBinary string: \Device\CdRom19
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume1\Windows\Prefetch\AgGlGlobalHistory.dbh
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_10081.NLS
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1257.NLSPop
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume1\Users\HI\AppData\LocalLow\SogouPY\InputStaticstics.datp
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume1\Windows\Fonts\BKANT.TTF
                Source: tasksche.exe.6.drBinary string: [\Device\HarddiskVolume1\Users\HI\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CFCA
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume1\Drivers\Audio.Intel\4p
                Source: tasksche.exe.6.drBinary string: B\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDACONEQ.inf
                Source: tasksche.exe.6.drBinary string: V\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\Caches\cversions.1.db0
                Source: tasksche.exe.6.drBinary string: B\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAPCEE4.infh
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\MSJHBD.TTC
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20924.NLSd
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\ANTQUABI.TTF
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\davhlpr.dll
                Source: tasksche.exe.6.drBinary string: &\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\zh-CN\localspl.dll.mui
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume1\Users\HI\IntelGraphicsProfiles\Enhance Video Colors.man.igpip
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume1\Users\Public\Desktop\Word 2013.lnk?
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\GARABD.TTFo
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_862.NLS
                Source: tasksche.exe.6.drBinary string: [\Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\System32\DXP.dll
                Source: tasksche.exe.6.drBinary string: z\Device\HarddiskVolume1\Windows\System32\DriverStore\FileRepository\prnms002.inf_x86_neutral_baa1493e6380688b\prnms002.inf
                Source: tasksche.exe.6.drBinary string: /\Device\Mup\nethd\any\Program Files\/T
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\Fonts\WINGDNG2.TTF
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\assembly\pubpol24.datp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20002.NLS
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume1\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}r
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume1\Windows\inf\.NET CLR Networking\0804t
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\inf\TermService\08048
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\msacm32.drv
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume1\Program Files\SogouInput\8.0.0.8083\runtime.ini
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_737.NLS
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\CENTURY.TTF
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\Fonts\ARIALNI.TTF
                Source: tasksche.exe.6.drBinary string: #\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\Fonts\IROOMR.ttf
                Source: tasksche.exe.6.drBinary string: l\Device\HarddiskVolume1\Windows\assembly\GAC_MSIL\PresentationCore.resources\3.0.0.0_zh-CHS_31bf3856ad364e35
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume1\Users\HI\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini
                Source: tasksche.exe.6.drBinary string: %\Device\HarddiskVolume2\Program Filesp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_850.NLS
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\wsnmp32.dllp
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: "\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1250.NLS
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Users\HI\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_x86_be3388afa6a748e8d34a9f7246d70918c5f44bc_0ea098c5\Report.wer
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume1\Windows\inf\PERFLIB\0000
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20932.NLS
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\PeerDist.dllp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\prnfldr.dll
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume1\Windows\System32\{A6D608F0-0BDE-491A-97AE-5C4B05D86E01}.bat
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Windows\System32\zh-CN\winhttp.dll.mui
                Source: tasksche.exe.6.drBinary string: ]\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\Cab7F0E.tmp
                Source: tasksche.exe.6.drBinary string: `\Device\HarddiskVolume1\$RECYCLE.BIN\S-1-5-21-3698138953-2470169120-1555830818-1000\$IZZ2JEP.lnk
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\C_20107.NLSd
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\igfxDI.dllx0p
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\C_1146.NLS?
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume1\Windows\System32\PING.EXEp
                Source: tasksche.exe.6.drBinary string: C\Device\HarddiskVolume1\Drivers\Audio.Realtek\HDA\New\HDAVienna.inf
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_zh-cn_6189e316803d96d4
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume1\Windows\System32\d3d10warp.dll
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume1\Windows\assembly\GAC_MSIL\System.ServiceProcess.resources\2.0.0.0_zh-CHS_b03f5f7f11d50a3a\System.ServiceProcess.Resources.dllp
                Source: tasksche.exe.6.drBinary string: '\Device\HarddiskVolume2\Lhb
                Source: tasksche.exe.6.drBinary string: Y\Device\HarddiskVolume1\Windows\CSC\v2.0.6\temp\ea-{2df87fe8-218a-11e2-bf13-d0c37ea82f06}
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\inf\UGatherer\0804
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume1\Windows\System32\zh-CN\FXSRESM.dll.mui
                Source: tasksche.exe.6.drBinary string: _\Device\HarddiskVolume1\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
                Source: tasksche.exe.6.drBinary string: n\Device\HarddiskVolume1\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My
                Source: tasksche.exe.6.drBinary string: &\Device\HarddiskVolume1\Windows\plug.bGA-
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume1\Windows\System32\wbem\en-US\cimwin32.dll.muip
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume1\Windows\inf\Windows Workflow Foundation 3.0.0.0\0804
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\C_863.NLS
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\igfxTray.exep
                Source: tasksche.exe, 0000000A.00000000.1512413486.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000000.1520311924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, k6fBkyS1R6.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,10_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3628:120:WilError_03
                Source: k6fBkyS1R6.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\k6fBkyS1R6.dll,PlayGame
                Source: k6fBkyS1R6.dllVirustotal: Detection: 88%
                Source: k6fBkyS1R6.dllReversingLabs: Detection: 94%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\k6fBkyS1R6.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",PlayGame
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\k6fBkyS1R6.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: k6fBkyS1R6.dllStatic file information: File size 5267459 > 1048576
                Source: k6fBkyS1R6.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 10_2_00407710 push eax; ret 10_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 10_2_004076C8 push eax; ret 10_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5276Thread sleep count: 93 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5276Thread sleep time: -186000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5588Thread sleep count: 127 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5588Thread sleep count: 35 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5276Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 00000006.00000002.1514441189.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                Source: mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPc
                Source: mssecsvc.exe, 00000006.00000002.1514441189.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2148253679.0000000000BD7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2148253679.0000000000C41000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 10_2_004029CC free,GetProcessHeap,HeapFree,10_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1Jump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media11
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS2
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591260 Sample: k6fBkyS1R6.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.100 unknown unknown 12->45 47 192.168.2.102 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                k6fBkyS1R6.dll88%VirustotalBrowse
                k6fBkyS1R6.dll95%ReversingLabsWin32.Ransomware.WannaCry
                k6fBkyS1R6.dll100%AviraTR/Ransom.Gen
                k6fBkyS1R6.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)97%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe97%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://www.kryptoslogic.com0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com70%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                104.16.167.228
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comk6fBkyS1R6.dllfalse
                      high
                      https://www.kryptoslogic.commssecsvc.exe, 00000006.00000002.1514441189.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000DA8000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/_mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D7C000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/zDmssecsvc.exe, 00000006.00000002.1514441189.0000000000C41000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com7mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/4mssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/dmssecsvc.exe, 00000008.00000002.2148253679.0000000000BEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/%mssecsvc.exe, 0000000B.00000002.1521977885.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2147379180.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    18.102.248.134
                                    unknownUnited States
                                    3MIT-GATEWAYSUSfalse
                                    184.77.186.1
                                    unknownUnited States
                                    16509AMAZON-02USfalse
                                    12.213.51.106
                                    unknownUnited States
                                    7018ATT-INTERNET4USfalse
                                    65.6.116.223
                                    unknownUnited States
                                    7018ATT-INTERNET4USfalse
                                    151.35.63.186
                                    unknownItaly
                                    1267ASN-WINDTREIUNETEUfalse
                                    93.209.140.1
                                    unknownGermany
                                    3320DTAGInternetserviceprovideroperationsDEfalse
                                    156.188.231.1
                                    unknownEgypt
                                    36992ETISALAT-MISREGfalse
                                    13.249.15.25
                                    unknownUnited States
                                    16509AMAZON-02USfalse
                                    18.102.248.2
                                    unknownUnited States
                                    3MIT-GATEWAYSUSfalse
                                    18.102.248.1
                                    unknownUnited States
                                    3MIT-GATEWAYSUSfalse
                                    168.200.116.1
                                    unknownUnited States
                                    27435OPSOURCE-INCUSfalse
                                    178.96.70.1
                                    unknownUnited Kingdom
                                    12576EELtdGBfalse
                                    12.213.51.1
                                    unknownUnited States
                                    7018ATT-INTERNET4USfalse
                                    145.132.230.1
                                    unknownNetherlands
                                    1136KPNKPNNationalEUfalse
                                    79.219.208.1
                                    unknownGermany
                                    3320DTAGInternetserviceprovideroperationsDEfalse
                                    158.12.16.1
                                    unknownUnited States
                                    668DNIC-AS-00668USfalse
                                    156.44.48.1
                                    unknownCanada
                                    3527NIH-NETUSfalse
                                    122.134.47.92
                                    unknownJapan2518BIGLOBEBIGLOBEIncJPfalse
                                    IP
                                    192.168.2.148
                                    192.168.2.149
                                    192.168.2.146
                                    192.168.2.147
                                    192.168.2.140
                                    192.168.2.141
                                    192.168.2.144
                                    192.168.2.145
                                    192.168.2.142
                                    192.168.2.143
                                    192.168.2.159
                                    192.168.2.157
                                    192.168.2.158
                                    192.168.2.151
                                    192.168.2.152
                                    192.168.2.150
                                    192.168.2.155
                                    192.168.2.156
                                    192.168.2.153
                                    192.168.2.154
                                    192.168.2.126
                                    192.168.2.247
                                    192.168.2.127
                                    192.168.2.248
                                    192.168.2.124
                                    192.168.2.245
                                    192.168.2.125
                                    192.168.2.246
                                    192.168.2.128
                                    192.168.2.249
                                    192.168.2.129
                                    192.168.2.240
                                    192.168.2.122
                                    192.168.2.243
                                    192.168.2.123
                                    192.168.2.244
                                    192.168.2.120
                                    192.168.2.241
                                    192.168.2.121
                                    192.168.2.242
                                    192.168.2.97
                                    192.168.2.137
                                    192.168.2.96
                                    192.168.2.138
                                    192.168.2.99
                                    192.168.2.135
                                    192.168.2.98
                                    192.168.2.136
                                    192.168.2.139
                                    192.168.2.250
                                    192.168.2.130
                                    192.168.2.251
                                    192.168.2.91
                                    192.168.2.90
                                    192.168.2.93
                                    192.168.2.133
                                    192.168.2.254
                                    192.168.2.92
                                    192.168.2.134
                                    192.168.2.95
                                    192.168.2.131
                                    192.168.2.252
                                    192.168.2.94
                                    192.168.2.132
                                    192.168.2.253
                                    192.168.2.104
                                    192.168.2.225
                                    192.168.2.105
                                    192.168.2.226
                                    192.168.2.102
                                    192.168.2.223
                                    192.168.2.103
                                    192.168.2.224
                                    192.168.2.108
                                    192.168.2.229
                                    192.168.2.109
                                    192.168.2.106
                                    192.168.2.227
                                    192.168.2.107
                                    192.168.2.228
                                    192.168.2.100
                                    192.168.2.221
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1591260
                                    Start date and time:2025-01-14 20:56:10 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 54s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:17
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:k6fBkyS1R6.dll
                                    renamed because original name is a hash value
                                    Original Sample Name:1d6958990c8c4f5b9b93efa692b84937.dll
                                    Detection:MAL
                                    Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .dll
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 2.16.168.117, 2.23.77.188, 2.17.190.73, 199.232.210.172, 20.12.23.50, 20.109.210.53, 13.107.253.45
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target tasksche.exe, PID 2740 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    14:57:17API Interceptor1x Sleep call for process: loaddll32.exe modified
                                    14:57:51API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.166.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.166.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.167.228
                                    LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.167.228
                                    qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                    • 104.17.244.81
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    AMAZON-02USjpXNd6Kt8z.dllGet hashmaliciousWannacryBrowse
                                    • 18.144.38.1
                                    bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 34.249.145.219
                                    XML-702.msiGet hashmaliciousAteraAgentBrowse
                                    • 13.35.58.7
                                    http://jooracces.comGet hashmaliciousUnknownBrowse
                                    • 13.32.99.59
                                    https://click.e.varietyvibes.buzz/Y3hpZjhhck5JNVlmRWJOUitMVlFVUzdWZlpZQm41V0lZS3E5dlJjWHNLbzhudFR6Qm5uVlZMZ2hqdkVBTmpZZUxFL2tJclNpYnJaTEdFOC9RVU5CZVlkY004d3ZTblF4S0Y5NW82WmdjMFU9Get hashmaliciousUnknownBrowse
                                    • 18.245.86.91
                                    http://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                    • 18.133.166.119
                                    http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                    • 18.245.31.23
                                    PropostaOrcamentoPdf.msiGet hashmaliciousAteraAgentBrowse
                                    • 35.157.63.229
                                    https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                    • 52.19.224.221
                                    http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                    • 54.71.88.81
                                    MIT-GATEWAYSUSFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                    • 18.87.50.143
                                    http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                    • 18.66.102.11
                                    https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                    • 18.172.112.4
                                    ppc.elfGet hashmaliciousUnknownBrowse
                                    • 18.53.34.15
                                    m68k.elfGet hashmaliciousUnknownBrowse
                                    • 19.67.67.62
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 18.26.48.180
                                    meth4.elfGet hashmaliciousMiraiBrowse
                                    • 18.54.203.251
                                    x86_64.elfGet hashmaliciousUnknownBrowse
                                    • 19.57.4.166
                                    NoticeOfPayment.docxGet hashmaliciousUnknownBrowse
                                    • 18.66.102.82
                                    http://links.notification.intuit.com/ls/click?upn=u001.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4d1fnHXIidRtPiokrK2um0Eple-2FkJVLqDQnYz8JTbzkA9WlXWZlL3ivdsx3brpVaTH-2FK6m9Qw3cu-2BvTOlnjPR-2BRQieb3dMUHHYNG5OQm5ryxF0Fsg8fRojMxisWNsOHrH9C1cyNh2C-2BapzmizNqUYRxhHtg93ylBbIqH4SXA-2BcyHnCgzv3EsQu4AeMgUYmPWnA-3D-3DLdh5_yvrO630WiuT7pZuPPGURxafPbqYMaSDh9TJohqr8UezRE8eV8vDlm-2BTA5TmdEDZ7yETp46OEIM2MjRx5Mgc-2FSy44clVANtwLrq3nrTfwacsucNAXy1OR1t4kO8Runkcodfdl27Tk2P3ljoutL4PngQr5QuG6-2BzAFT5LByFkcNsd4ZN4BjPhWe-2FurNg8n55w3pC1a745KRvgSQJLhnfGqvVCPndWBC-2FrOGmouU9sI8e8126CrPE36g6YnfTU62FfgD4iz7YqhY5ClzJJ1rfDytmBE27deoiPYjSCUIOExKeOY9BXwol6hEnBu1JrowSiwfKjh7zwfuBtmrvZ6vSOSA4TPvkxfFcg8BlrW1vQm3N4xNhNATHmDPJ14VDZ37GTEiI3qtLYdiyXWWkTzMMnRfMqqHTb6pk7iw0nQ-2B-2F-2BoVFAByTiDqFl-2BEIRuBMpx3EAFKUBzR-2BFkYOUJfVO0AgKNNrj8RX8iEkzqu1jtQg7ixHYmsOTyS67b-2FfHfta82o4E2JYjYGlK5-2B4oC7YaK6nqpfLyDha24FrKV-2FLp72I4nvgzKLPEnT5ZwYuSOhCg3YVBTmOz2nIgG2JSkyg5oeFqAqgkNSx8fK8zislf-2BrA2fYIACU0BIPGyf0fmRMsEmqkL-2Bp3BFpdaGyMHdF1x-2BecUEBz6lLoiPwOcsUtngmDNDJXvvknBRqzikOl9M6fGqG3fXa1gCTdQ65koy28-2F-2BBWPXowJpnZS4HZIyZUo5CD6QHJWBreucOVPnNwQeZjC-2FzCK4Cce5NO367-2F8X6iGngzToJ76PKlG3iKmQrD2mUaULlSVRgzOCG3qGCu5c3-2FNswHxTGs5sX1Z4U8SbnKLBV1PKGCxM9T4n09h2aVmLlExK8v00nv29XzsU7Po9gelTF-2FjMSswYLkMiSOnzlY2BCdCwDuNC1nvBteBGpD-2F22OmpeXpRAaJ0J-2B4lsJiYMNTfeLTVpUwXJ8O1S1sYa5RHOdrs-2FcoPQw3UvxHuDk-2F8iCLoYwSk9C9RD2cz2elRWzi1C1ns-2FlhCnZAhjcKv9Z9Ae1z44jmN81TExev-2BlHq6EzmdhrItggowvzubiVKpLOI41-2FppAUrbGiqMHyKjd3-2F4kk-2Flz32iYslSzl6Dn0eXeS9GKE-2Bpl29Z6ROXa7u-2B5uui0VMIdUdli6dq52DdaYFYPlzSXZJZD6dU1iBoKstrswPNVadTn-2FAGgQ05qSC-2Bkb7G8HU-2BK5xqU5Ufalh9-2FjFROiYaxD3E-2Bu8NoLa7LrZn2WpO-2F0jyY6Vd6CrNPSPrDmzB8lSbamUhpcGSHkMvagS5o-2By7jAAciI99IX68zm80Q3YVM-2BJI1Dy0kwunCbTG4zRPUdxDxmPiGishQoGtkqOda43zr5FgVLFBsuyricc5CP0Uj0NZhEVb-2Br-2FOT93qdqnJE6-2FTp6T2R9YtWtiv-2BEfeLsX6gcdvCtN3M6I13WFY-2ByaP1CVexX5752k6SmFvyspk50EqGet hashmaliciousUnknownBrowse
                                    • 18.66.102.30
                                    ATT-INTERNET4USFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                    • 12.85.167.44
                                    http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                    • 13.32.27.22
                                    meth3.elfGet hashmaliciousMiraiBrowse
                                    • 13.183.171.175
                                    meth1.elfGet hashmaliciousMiraiBrowse
                                    • 99.160.219.59
                                    https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                    • 99.158.47.182
                                    https://mercedesinsua.com.ar/?infox=Ymxha2Uuc2lyZ29AY290ZXJyYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                    • 13.32.27.44
                                    arm4.elfGet hashmaliciousUnknownBrowse
                                    • 66.72.133.250
                                    m68k.elfGet hashmaliciousUnknownBrowse
                                    • 68.88.194.85
                                    i686.elfGet hashmaliciousUnknownBrowse
                                    • 71.132.22.24
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 12.2.209.25
                                    ATT-INTERNET4USFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                    • 12.85.167.44
                                    http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                    • 13.32.27.22
                                    meth3.elfGet hashmaliciousMiraiBrowse
                                    • 13.183.171.175
                                    meth1.elfGet hashmaliciousMiraiBrowse
                                    • 99.160.219.59
                                    https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                    • 99.158.47.182
                                    https://mercedesinsua.com.ar/?infox=Ymxha2Uuc2lyZ29AY290ZXJyYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                    • 13.32.27.44
                                    arm4.elfGet hashmaliciousUnknownBrowse
                                    • 66.72.133.250
                                    m68k.elfGet hashmaliciousUnknownBrowse
                                    • 68.88.194.85
                                    i686.elfGet hashmaliciousUnknownBrowse
                                    • 71.132.22.24
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 12.2.209.25
                                    No context
                                    No context
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):4.732953202296849
                                    Encrypted:false
                                    SSDEEP:24576:nQhfdmMSirYbcMNgef0B+RdhAdmv1LJMfcH9EPQ:nQqMSPbcBVIRdhnvxJM0H9d
                                    MD5:FAE2EB3636050E9697B9B8DDDB47E1CA
                                    SHA1:822CCC070C2CBC679A531680237F62C849D99831
                                    SHA-256:0930215E92EE032D598661604AF30E3D733EEEA0499AAED0EBF8127F0C7ACBA5
                                    SHA-512:4C1CAB72324650FD122118984B9979BDD299764B868B806795C6D55FC6A7F885EB98A32A371910E5164A60C4478CD3E86BDE77481CDBDD61B904BC8983C4E714
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 97%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):4.732953202296849
                                    Encrypted:false
                                    SSDEEP:24576:nQhfdmMSirYbcMNgef0B+RdhAdmv1LJMfcH9EPQ:nQqMSPbcBVIRdhnvxJM0H9d
                                    MD5:FAE2EB3636050E9697B9B8DDDB47E1CA
                                    SHA1:822CCC070C2CBC679A531680237F62C849D99831
                                    SHA-256:0930215E92EE032D598661604AF30E3D733EEEA0499AAED0EBF8127F0C7ACBA5
                                    SHA-512:4C1CAB72324650FD122118984B9979BDD299764B868B806795C6D55FC6A7F885EB98A32A371910E5164A60C4478CD3E86BDE77481CDBDD61B904BC8983C4E714
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 97%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):3.656625701263977
                                    TrID:
                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                    • DOS Executable Generic (2002/1) 0.20%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:k6fBkyS1R6.dll
                                    File size:5'267'459 bytes
                                    MD5:1d6958990c8c4f5b9b93efa692b84937
                                    SHA1:58bc6052ee6a13dc4711ca73df029a694f6e7239
                                    SHA256:716954bdf4ef6882a71c8f2aa3981190da7777b50a3988069bb68eed17c7ddc8
                                    SHA512:cb1445e197763d3ae28e8b7186a5f57cd8f34cbcba7c627d7004eb6dddbca67526ae721aff62d26c21b3585c0caef698b236194c90619c970099a5eced8d2682
                                    SSDEEP:24576:SbLgddQhfdmMSirYbcMNgef0B+RdhAdmv1LJMfcH9EP:SnAQqMSPbcBVIRdhnvxJM0H9
                                    TLSH:8A36D742D5C51EA0C9F11AF6127A9B10933A6F89869BA16F2625700F1CB7F0CDDE5F2C
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                    Icon Hash:7ae282899bbab082
                                    Entrypoint:0x100011e9
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x10000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                    DLL Characteristics:
                                    Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    push ebx
                                    mov ebx, dword ptr [ebp+08h]
                                    push esi
                                    mov esi, dword ptr [ebp+0Ch]
                                    push edi
                                    mov edi, dword ptr [ebp+10h]
                                    test esi, esi
                                    jne 00007FB298D741FBh
                                    cmp dword ptr [10003140h], 00000000h
                                    jmp 00007FB298D74218h
                                    cmp esi, 01h
                                    je 00007FB298D741F7h
                                    cmp esi, 02h
                                    jne 00007FB298D74214h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007FB298D741FBh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    test eax, eax
                                    je 00007FB298D741FEh
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FB298D7410Ah
                                    test eax, eax
                                    jne 00007FB298D741F6h
                                    xor eax, eax
                                    jmp 00007FB298D74240h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FB298D73FBCh
                                    cmp esi, 01h
                                    mov dword ptr [ebp+0Ch], eax
                                    jne 00007FB298D741FEh
                                    test eax, eax
                                    jne 00007FB298D74229h
                                    push edi
                                    push eax
                                    push ebx
                                    call 00007FB298D740E6h
                                    test esi, esi
                                    je 00007FB298D741F7h
                                    cmp esi, 03h
                                    jne 00007FB298D74218h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FB298D740D5h
                                    test eax, eax
                                    jne 00007FB298D741F5h
                                    and dword ptr [ebp+0Ch], eax
                                    cmp dword ptr [ebp+0Ch], 00000000h
                                    je 00007FB298D74203h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007FB298D741FAh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    mov dword ptr [ebp+0Ch], eax
                                    mov eax, dword ptr [ebp+0Ch]
                                    pop edi
                                    pop esi
                                    pop ebx
                                    pop ebp
                                    retn 000Ch
                                    jmp dword ptr [10002028h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    Programming Language:
                                    • [ C ] VS98 (6.0) build 8168
                                    • [C++] VS98 (6.0) build 8168
                                    • [RES] VS98 (6.0) cvtres build 1720
                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x40000x5000600x5010003dc67c462054a49332f0d20f7f705723unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    W0x40600x500000dataEnglishUnited States0.7055644989013672
                                    DLLImport
                                    KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                    MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                    NameOrdinalAddress
                                    PlayGame10x10001114
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-14T20:57:16.155263+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8595421.1.1.153UDP
                                    2025-01-14T20:57:16.680047+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849704104.16.167.22880TCP
                                    2025-01-14T20:57:16.680047+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849704104.16.167.22880TCP
                                    2025-01-14T20:57:16.680047+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849704104.16.167.22880TCP
                                    2025-01-14T20:57:16.680047+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849704104.16.167.22880TCP
                                    2025-01-14T20:57:16.680047+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849704104.16.167.22880TCP
                                    2025-01-14T20:57:16.703851+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849704TCP
                                    2025-01-14T20:57:18.171270+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849705104.16.167.22880TCP
                                    2025-01-14T20:57:18.171270+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849705104.16.167.22880TCP
                                    2025-01-14T20:57:18.171270+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849705104.16.167.22880TCP
                                    2025-01-14T20:57:18.171270+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849705104.16.167.22880TCP
                                    2025-01-14T20:57:18.171270+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849705104.16.167.22880TCP
                                    2025-01-14T20:57:18.171861+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849705TCP
                                    2025-01-14T20:57:18.952400+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849714104.16.167.22880TCP
                                    2025-01-14T20:57:18.952400+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849714104.16.167.22880TCP
                                    2025-01-14T20:57:18.952400+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849714104.16.167.22880TCP
                                    2025-01-14T20:57:18.952400+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849714104.16.167.22880TCP
                                    2025-01-14T20:57:18.952400+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849714104.16.167.22880TCP
                                    2025-01-14T20:57:18.953281+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849714TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 20:57:06.947532892 CET49673443192.168.2.823.206.229.226
                                    Jan 14, 2025 20:57:07.338171005 CET49672443192.168.2.823.206.229.226
                                    Jan 14, 2025 20:57:12.541306973 CET49676443192.168.2.852.182.143.211
                                    Jan 14, 2025 20:57:15.213370085 CET4967780192.168.2.8192.229.211.108
                                    Jan 14, 2025 20:57:16.170686960 CET4970480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:16.175517082 CET8049704104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:16.175641060 CET4970480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:16.175786018 CET4970480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:16.180675030 CET8049704104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:16.556854963 CET49673443192.168.2.823.206.229.226
                                    Jan 14, 2025 20:57:16.678628922 CET8049704104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:16.680022955 CET8049704104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:16.680047035 CET4970480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:16.680087090 CET4970480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:16.698455095 CET4970480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:16.703850985 CET8049704104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:16.947643042 CET49672443192.168.2.823.206.229.226
                                    Jan 14, 2025 20:57:17.648494005 CET4970580192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:17.653399944 CET8049705104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:17.653470993 CET4970580192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:17.653594017 CET4970580192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:17.658354998 CET8049705104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.171195030 CET8049705104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.171269894 CET4970580192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.171353102 CET4970580192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.171860933 CET8049705104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.171926022 CET4970580192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.176116943 CET8049705104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.230196953 CET49706445192.168.2.8160.166.147.126
                                    Jan 14, 2025 20:57:18.235064983 CET44549706160.166.147.126192.168.2.8
                                    Jan 14, 2025 20:57:18.235133886 CET49706445192.168.2.8160.166.147.126
                                    Jan 14, 2025 20:57:18.235165119 CET49706445192.168.2.8160.166.147.126
                                    Jan 14, 2025 20:57:18.235398054 CET49707445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.240509033 CET44549707160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:18.240565062 CET49707445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.240598917 CET49707445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.240612030 CET44549706160.166.147.126192.168.2.8
                                    Jan 14, 2025 20:57:18.240648985 CET49706445192.168.2.8160.166.147.126
                                    Jan 14, 2025 20:57:18.245531082 CET44549707160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:18.245575905 CET49707445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.247920036 CET49708445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.252775908 CET44549708160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:18.252834082 CET49708445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.252877951 CET49708445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:18.258521080 CET44549708160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:18.476438046 CET4971480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.481277943 CET8049714104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.481362104 CET4971480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.481518984 CET4971480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.486253977 CET8049714104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.580131054 CET4434970323.206.229.226192.168.2.8
                                    Jan 14, 2025 20:57:18.580204964 CET49703443192.168.2.823.206.229.226
                                    Jan 14, 2025 20:57:18.952342033 CET8049714104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.952399969 CET4971480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.952487946 CET4971480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.953280926 CET8049714104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:18.953337908 CET4971480192.168.2.8104.16.167.228
                                    Jan 14, 2025 20:57:18.957349062 CET8049714104.16.167.228192.168.2.8
                                    Jan 14, 2025 20:57:20.238495111 CET49732445192.168.2.8103.42.227.36
                                    Jan 14, 2025 20:57:20.243391991 CET44549732103.42.227.36192.168.2.8
                                    Jan 14, 2025 20:57:20.244755030 CET49732445192.168.2.8103.42.227.36
                                    Jan 14, 2025 20:57:20.244827032 CET49732445192.168.2.8103.42.227.36
                                    Jan 14, 2025 20:57:20.245049953 CET49733445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.249778986 CET44549732103.42.227.36192.168.2.8
                                    Jan 14, 2025 20:57:20.249859095 CET49732445192.168.2.8103.42.227.36
                                    Jan 14, 2025 20:57:20.249880075 CET44549733103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:20.249939919 CET49733445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.283634901 CET49733445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.288563013 CET44549733103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:20.288661003 CET49733445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.289855003 CET49734445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.294737101 CET44549734103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:20.294815063 CET49734445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.294852972 CET49734445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:20.299688101 CET44549734103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:22.245851040 CET49756445192.168.2.89.81.42.185
                                    Jan 14, 2025 20:57:22.250890017 CET445497569.81.42.185192.168.2.8
                                    Jan 14, 2025 20:57:22.251003027 CET49756445192.168.2.89.81.42.185
                                    Jan 14, 2025 20:57:22.251082897 CET49756445192.168.2.89.81.42.185
                                    Jan 14, 2025 20:57:22.251398087 CET49757445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.256361008 CET445497579.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:22.256454945 CET49757445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.256491899 CET49757445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.256805897 CET445497569.81.42.185192.168.2.8
                                    Jan 14, 2025 20:57:22.256860971 CET49756445192.168.2.89.81.42.185
                                    Jan 14, 2025 20:57:22.257754087 CET49758445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.261965036 CET445497579.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:22.262037039 CET49757445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.262639046 CET445497589.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:22.262710094 CET49758445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.262794971 CET49758445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:22.267565966 CET445497589.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:24.261495113 CET49780445192.168.2.860.237.150.150
                                    Jan 14, 2025 20:57:24.266459942 CET4454978060.237.150.150192.168.2.8
                                    Jan 14, 2025 20:57:24.266532898 CET49780445192.168.2.860.237.150.150
                                    Jan 14, 2025 20:57:24.266664028 CET49780445192.168.2.860.237.150.150
                                    Jan 14, 2025 20:57:24.266911030 CET49782445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.271923065 CET4454978260.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:24.271944046 CET4454978060.237.150.150192.168.2.8
                                    Jan 14, 2025 20:57:24.272001982 CET49782445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.272046089 CET49780445192.168.2.860.237.150.150
                                    Jan 14, 2025 20:57:24.272164106 CET49782445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.274200916 CET49783445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.277268887 CET4454978260.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:24.277401924 CET49782445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.279176950 CET4454978360.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:24.279247046 CET49783445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.279333115 CET49783445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:24.284811020 CET4454978360.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:26.323728085 CET49803445192.168.2.818.102.248.134
                                    Jan 14, 2025 20:57:26.328592062 CET4454980318.102.248.134192.168.2.8
                                    Jan 14, 2025 20:57:26.328704119 CET49803445192.168.2.818.102.248.134
                                    Jan 14, 2025 20:57:26.329243898 CET49803445192.168.2.818.102.248.134
                                    Jan 14, 2025 20:57:26.329494953 CET49804445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.334326982 CET4454980418.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:26.334439993 CET49804445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.334932089 CET4454980318.102.248.134192.168.2.8
                                    Jan 14, 2025 20:57:26.334978104 CET49803445192.168.2.818.102.248.134
                                    Jan 14, 2025 20:57:26.336050034 CET49804445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.340888023 CET4454980418.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:26.340965986 CET49804445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.447455883 CET49805445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.452370882 CET4454980518.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:26.452477932 CET49805445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.473516941 CET49805445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:26.478326082 CET4454980518.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:28.296677113 CET49831445192.168.2.8154.83.180.6
                                    Jan 14, 2025 20:57:28.301496983 CET44549831154.83.180.6192.168.2.8
                                    Jan 14, 2025 20:57:28.301568985 CET49831445192.168.2.8154.83.180.6
                                    Jan 14, 2025 20:57:28.301724911 CET49831445192.168.2.8154.83.180.6
                                    Jan 14, 2025 20:57:28.302155018 CET49832445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.306566954 CET44549831154.83.180.6192.168.2.8
                                    Jan 14, 2025 20:57:28.306662083 CET49831445192.168.2.8154.83.180.6
                                    Jan 14, 2025 20:57:28.306922913 CET44549832154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:28.306979895 CET49832445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.307116032 CET49832445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.309091091 CET49833445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.312031984 CET44549832154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:28.312078953 CET49832445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.313900948 CET44549833154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:28.313961983 CET49833445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.314018011 CET49833445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:28.318867922 CET44549833154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:30.307990074 CET49854445192.168.2.865.6.116.223
                                    Jan 14, 2025 20:57:30.312791109 CET4454985465.6.116.223192.168.2.8
                                    Jan 14, 2025 20:57:30.312849045 CET49854445192.168.2.865.6.116.223
                                    Jan 14, 2025 20:57:30.312895060 CET49854445192.168.2.865.6.116.223
                                    Jan 14, 2025 20:57:30.313116074 CET49855445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.317910910 CET4454985565.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:30.317924023 CET4454985465.6.116.223192.168.2.8
                                    Jan 14, 2025 20:57:30.317971945 CET49855445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.317998886 CET49854445192.168.2.865.6.116.223
                                    Jan 14, 2025 20:57:30.318015099 CET49855445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.318380117 CET49856445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.322912931 CET4454985565.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:30.322958946 CET49855445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.323133945 CET4454985665.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:30.323182106 CET49856445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.323203087 CET49856445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:30.327963114 CET4454985665.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:32.358484983 CET49878445192.168.2.8156.101.233.91
                                    Jan 14, 2025 20:57:32.363255024 CET44549878156.101.233.91192.168.2.8
                                    Jan 14, 2025 20:57:32.366866112 CET49878445192.168.2.8156.101.233.91
                                    Jan 14, 2025 20:57:32.367252111 CET49878445192.168.2.8156.101.233.91
                                    Jan 14, 2025 20:57:32.367490053 CET49879445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.372139931 CET44549878156.101.233.91192.168.2.8
                                    Jan 14, 2025 20:57:32.372286081 CET44549879156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:32.372391939 CET49878445192.168.2.8156.101.233.91
                                    Jan 14, 2025 20:57:32.372395039 CET49879445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.378876925 CET49879445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.379760027 CET49881445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.383666992 CET44549879156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:32.383727074 CET49879445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.384571075 CET44549881156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:32.386173010 CET49881445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.388855934 CET49881445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:32.393645048 CET44549881156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:34.372389078 CET49903445192.168.2.8177.247.109.190
                                    Jan 14, 2025 20:57:34.377857924 CET44549903177.247.109.190192.168.2.8
                                    Jan 14, 2025 20:57:34.378297091 CET49903445192.168.2.8177.247.109.190
                                    Jan 14, 2025 20:57:34.378298044 CET49903445192.168.2.8177.247.109.190
                                    Jan 14, 2025 20:57:34.378540993 CET49904445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.383435965 CET44549904177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:34.383452892 CET44549903177.247.109.190192.168.2.8
                                    Jan 14, 2025 20:57:34.383563995 CET49904445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.383567095 CET49903445192.168.2.8177.247.109.190
                                    Jan 14, 2025 20:57:34.383900881 CET49904445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.384800911 CET49905445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.388686895 CET44549904177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:34.388811111 CET49904445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.389568090 CET44549905177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:34.389805079 CET49905445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.389805079 CET49905445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:34.394659042 CET44549905177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:36.385970116 CET49928445192.168.2.868.199.209.44
                                    Jan 14, 2025 20:57:36.391088009 CET4454992868.199.209.44192.168.2.8
                                    Jan 14, 2025 20:57:36.391180992 CET49928445192.168.2.868.199.209.44
                                    Jan 14, 2025 20:57:36.391261101 CET49928445192.168.2.868.199.209.44
                                    Jan 14, 2025 20:57:36.391503096 CET49929445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.396163940 CET4454992868.199.209.44192.168.2.8
                                    Jan 14, 2025 20:57:36.396178961 CET4454992868.199.209.44192.168.2.8
                                    Jan 14, 2025 20:57:36.396249056 CET49928445192.168.2.868.199.209.44
                                    Jan 14, 2025 20:57:36.396255970 CET4454992968.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:36.396317005 CET49929445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.396363020 CET49929445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.396744013 CET49930445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.401262999 CET4454992968.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:36.401324987 CET49929445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.401642084 CET4454993068.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:36.401700974 CET49930445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.401737928 CET49930445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:36.406537056 CET4454993068.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:38.424948931 CET49951445192.168.2.8156.44.48.118
                                    Jan 14, 2025 20:57:38.429786921 CET44549951156.44.48.118192.168.2.8
                                    Jan 14, 2025 20:57:38.429878950 CET49951445192.168.2.8156.44.48.118
                                    Jan 14, 2025 20:57:38.440277100 CET49951445192.168.2.8156.44.48.118
                                    Jan 14, 2025 20:57:38.440471888 CET49952445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.445241928 CET44549952156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:57:38.445336103 CET49952445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.445900917 CET44549951156.44.48.118192.168.2.8
                                    Jan 14, 2025 20:57:38.445950031 CET49951445192.168.2.8156.44.48.118
                                    Jan 14, 2025 20:57:38.446579933 CET49952445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.451459885 CET44549952156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:57:38.451534033 CET49952445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.475043058 CET49953445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.480021954 CET44549953156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:57:38.480129957 CET49953445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.482254028 CET49953445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:38.487138033 CET44549953156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:57:39.622001886 CET44549708160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:39.622126102 CET49708445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:39.622174025 CET49708445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:39.622251034 CET49708445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:39.627063036 CET44549708160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:39.627088070 CET44549708160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:40.432620049 CET49976445192.168.2.8192.220.11.165
                                    Jan 14, 2025 20:57:40.437473059 CET44549976192.220.11.165192.168.2.8
                                    Jan 14, 2025 20:57:40.437566042 CET49976445192.168.2.8192.220.11.165
                                    Jan 14, 2025 20:57:40.437596083 CET49976445192.168.2.8192.220.11.165
                                    Jan 14, 2025 20:57:40.437710047 CET49977445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.442651987 CET44549977192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:57:40.442747116 CET49977445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.442763090 CET44549976192.220.11.165192.168.2.8
                                    Jan 14, 2025 20:57:40.442816019 CET49976445192.168.2.8192.220.11.165
                                    Jan 14, 2025 20:57:40.442940950 CET49977445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.443263054 CET49978445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.447793007 CET44549977192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:57:40.447850943 CET49977445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.448115110 CET44549978192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:57:40.448169947 CET49978445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.448200941 CET49978445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:57:40.453114986 CET44549978192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:57:41.673620939 CET44549734103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:41.673683882 CET49734445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:41.673765898 CET49734445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:41.673844099 CET49734445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:41.678726912 CET44549734103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:41.678740025 CET44549734103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:42.448086977 CET50000445192.168.2.8177.103.120.145
                                    Jan 14, 2025 20:57:42.452967882 CET44550000177.103.120.145192.168.2.8
                                    Jan 14, 2025 20:57:42.453052998 CET50000445192.168.2.8177.103.120.145
                                    Jan 14, 2025 20:57:42.453259945 CET50001445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.453577042 CET50000445192.168.2.8177.103.120.145
                                    Jan 14, 2025 20:57:42.458060980 CET44550001177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:57:42.458123922 CET50001445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.458158016 CET50001445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.458347082 CET44550000177.103.120.145192.168.2.8
                                    Jan 14, 2025 20:57:42.458389997 CET50000445192.168.2.8177.103.120.145
                                    Jan 14, 2025 20:57:42.458507061 CET50002445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.463221073 CET44550001177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:57:42.463258982 CET44550002177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:57:42.463263988 CET50001445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.463326931 CET50002445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.463361025 CET50002445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:57:42.468101025 CET44550002177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:57:42.635638952 CET50004445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:42.640532017 CET44550004160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:42.640623093 CET50004445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:42.640708923 CET50004445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:57:42.645426989 CET44550004160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:57:43.720911026 CET445497589.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:43.720983028 CET49758445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:43.721060991 CET49758445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:43.721139908 CET49758445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:43.725817919 CET445497589.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:43.725864887 CET445497589.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:44.484985113 CET50009445192.168.2.867.23.172.118
                                    Jan 14, 2025 20:57:44.489900112 CET4455000967.23.172.118192.168.2.8
                                    Jan 14, 2025 20:57:44.489993095 CET50009445192.168.2.867.23.172.118
                                    Jan 14, 2025 20:57:44.490087032 CET50009445192.168.2.867.23.172.118
                                    Jan 14, 2025 20:57:44.490295887 CET50010445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.495130062 CET4455001067.23.172.1192.168.2.8
                                    Jan 14, 2025 20:57:44.495142937 CET4455000967.23.172.118192.168.2.8
                                    Jan 14, 2025 20:57:44.495193958 CET50010445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.495223045 CET50009445192.168.2.867.23.172.118
                                    Jan 14, 2025 20:57:44.506866932 CET50010445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.507227898 CET50011445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.511812925 CET4455001067.23.172.1192.168.2.8
                                    Jan 14, 2025 20:57:44.511889935 CET50010445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.511995077 CET4455001167.23.172.1192.168.2.8
                                    Jan 14, 2025 20:57:44.512063026 CET50011445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.513926029 CET50011445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:57:44.518752098 CET4455001167.23.172.1192.168.2.8
                                    Jan 14, 2025 20:57:44.682398081 CET50012445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:44.687366962 CET44550012103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:44.687499046 CET50012445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:44.687499046 CET50012445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:44.692364931 CET44550012103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:45.685991049 CET4454978360.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:45.686525106 CET49783445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:45.686597109 CET49783445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:45.686683893 CET49783445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:45.692981005 CET4454978360.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:45.692996025 CET4454978360.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:46.495547056 CET50013445192.168.2.8156.188.231.130
                                    Jan 14, 2025 20:57:46.500494957 CET44550013156.188.231.130192.168.2.8
                                    Jan 14, 2025 20:57:46.500588894 CET50013445192.168.2.8156.188.231.130
                                    Jan 14, 2025 20:57:46.500606060 CET50013445192.168.2.8156.188.231.130
                                    Jan 14, 2025 20:57:46.500735998 CET50014445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.505546093 CET44550014156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:57:46.505641937 CET50014445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.505665064 CET50014445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.505678892 CET44550013156.188.231.130192.168.2.8
                                    Jan 14, 2025 20:57:46.505733967 CET50013445192.168.2.8156.188.231.130
                                    Jan 14, 2025 20:57:46.506063938 CET50015445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.510648012 CET44550014156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:57:46.510694981 CET50014445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.510874033 CET44550015156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:57:46.510941029 CET50015445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.510979891 CET50015445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:57:46.515836954 CET44550015156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:57:46.730266094 CET50016445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:46.735236883 CET445500169.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:46.735342026 CET50016445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:46.736181974 CET50016445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:57:46.740971088 CET445500169.81.42.1192.168.2.8
                                    Jan 14, 2025 20:57:47.828454971 CET4454980518.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:47.828540087 CET49805445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:47.828604937 CET49805445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:47.828694105 CET49805445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:47.833543062 CET4454980518.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:47.833554983 CET4454980518.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:48.510901928 CET50017445192.168.2.873.40.250.151
                                    Jan 14, 2025 20:57:48.515844107 CET4455001773.40.250.151192.168.2.8
                                    Jan 14, 2025 20:57:48.515988111 CET50017445192.168.2.873.40.250.151
                                    Jan 14, 2025 20:57:48.516021013 CET50017445192.168.2.873.40.250.151
                                    Jan 14, 2025 20:57:48.516248941 CET50018445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.521022081 CET4455001773.40.250.151192.168.2.8
                                    Jan 14, 2025 20:57:48.521056890 CET4455001873.40.250.1192.168.2.8
                                    Jan 14, 2025 20:57:48.521141052 CET50017445192.168.2.873.40.250.151
                                    Jan 14, 2025 20:57:48.521190882 CET50018445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.521281958 CET50018445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.521600962 CET50019445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.526979923 CET4455001873.40.250.1192.168.2.8
                                    Jan 14, 2025 20:57:48.526997089 CET4455001973.40.250.1192.168.2.8
                                    Jan 14, 2025 20:57:48.527081966 CET50018445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.527105093 CET50019445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.527204037 CET50019445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:57:48.532495975 CET4455001973.40.250.1192.168.2.8
                                    Jan 14, 2025 20:57:48.697959900 CET50020445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:48.703007936 CET4455002060.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:48.703152895 CET50020445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:48.703236103 CET50020445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:57:48.708081007 CET4455002060.237.150.1192.168.2.8
                                    Jan 14, 2025 20:57:49.020229101 CET44550012103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:49.020356894 CET50012445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:49.020503044 CET50012445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:49.020503044 CET50012445192.168.2.8103.42.227.1
                                    Jan 14, 2025 20:57:49.025479078 CET44550012103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:49.025489092 CET44550012103.42.227.1192.168.2.8
                                    Jan 14, 2025 20:57:49.072963953 CET50021445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.077851057 CET44550021103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:57:49.077960014 CET50021445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.077996969 CET50021445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.078289986 CET50022445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.082896948 CET44550021103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:57:49.082976103 CET50021445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.083154917 CET44550022103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:57:49.083224058 CET50022445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.083293915 CET50022445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:57:49.088064909 CET44550022103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:57:49.685381889 CET44549833154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:49.685487986 CET49833445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:49.685570002 CET49833445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:49.685657024 CET49833445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:49.690314054 CET44549833154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:49.690438986 CET44549833154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:50.533441067 CET50023445192.168.2.8122.134.47.92
                                    Jan 14, 2025 20:57:50.541649103 CET44550023122.134.47.92192.168.2.8
                                    Jan 14, 2025 20:57:50.541726112 CET50023445192.168.2.8122.134.47.92
                                    Jan 14, 2025 20:57:50.541819096 CET50023445192.168.2.8122.134.47.92
                                    Jan 14, 2025 20:57:50.541981936 CET50024445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.546854019 CET44550024122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:57:50.546952009 CET44550023122.134.47.92192.168.2.8
                                    Jan 14, 2025 20:57:50.546956062 CET50024445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.547005892 CET50023445192.168.2.8122.134.47.92
                                    Jan 14, 2025 20:57:50.606118917 CET50024445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.611253977 CET44550024122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:57:50.611327887 CET50024445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.618722916 CET50025445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.623859882 CET44550025122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:57:50.623945951 CET50025445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.624484062 CET50025445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:57:50.629683018 CET44550025122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:57:50.838474035 CET50026445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:50.844172001 CET4455002618.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:50.844247103 CET50026445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:50.844352007 CET50026445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:57:50.850044012 CET4455002618.102.248.1192.168.2.8
                                    Jan 14, 2025 20:57:51.668503046 CET4454985665.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:51.668596029 CET49856445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:51.668663025 CET49856445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:51.668705940 CET49856445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:51.673553944 CET4454985665.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:51.673585892 CET4454985665.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:52.544167995 CET50027445192.168.2.866.248.232.73
                                    Jan 14, 2025 20:57:52.549248934 CET4455002766.248.232.73192.168.2.8
                                    Jan 14, 2025 20:57:52.549477100 CET50027445192.168.2.866.248.232.73
                                    Jan 14, 2025 20:57:52.549477100 CET50027445192.168.2.866.248.232.73
                                    Jan 14, 2025 20:57:52.549643993 CET50028445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.554529905 CET4455002866.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:52.554625988 CET50028445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.554737091 CET50028445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.554977894 CET4455002766.248.232.73192.168.2.8
                                    Jan 14, 2025 20:57:52.555042982 CET50027445192.168.2.866.248.232.73
                                    Jan 14, 2025 20:57:52.555243015 CET50029445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.559659958 CET4455002866.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:52.559734106 CET50028445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.560013056 CET4455002966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:52.560085058 CET50029445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.560338974 CET50029445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:52.565150976 CET4455002966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:52.698124886 CET50030445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:52.705445051 CET44550030154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:52.705540895 CET50030445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:52.705718994 CET50030445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:57:52.710577011 CET44550030154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:57:53.746936083 CET44549881156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:53.747040033 CET49881445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:53.747942924 CET49881445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:53.747992039 CET49881445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:53.752758980 CET44549881156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:53.752770901 CET44549881156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:54.139559984 CET4455002966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:54.139631033 CET50029445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:54.139686108 CET50029445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:54.139707088 CET50029445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:54.144551992 CET4455002966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:54.144573927 CET4455002966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:54.416814089 CET50031445192.168.2.8145.132.230.63
                                    Jan 14, 2025 20:57:54.421706915 CET44550031145.132.230.63192.168.2.8
                                    Jan 14, 2025 20:57:54.421772957 CET50031445192.168.2.8145.132.230.63
                                    Jan 14, 2025 20:57:54.421844959 CET50031445192.168.2.8145.132.230.63
                                    Jan 14, 2025 20:57:54.422045946 CET50032445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.426933050 CET44550032145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:57:54.426995993 CET50032445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.427026033 CET50032445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.427072048 CET44550031145.132.230.63192.168.2.8
                                    Jan 14, 2025 20:57:54.427117109 CET50031445192.168.2.8145.132.230.63
                                    Jan 14, 2025 20:57:54.427376986 CET50033445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.431931019 CET44550032145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:57:54.431992054 CET50032445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.432189941 CET44550033145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:57:54.432250023 CET50033445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.432300091 CET50033445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:57:54.437036037 CET44550033145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:57:54.682209969 CET50034445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:54.687119007 CET4455003465.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:54.687195063 CET50034445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:54.687213898 CET50034445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:57:54.692610025 CET4455003465.6.116.1192.168.2.8
                                    Jan 14, 2025 20:57:55.763983011 CET44549905177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:55.764081001 CET49905445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:55.764141083 CET49905445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:55.764188051 CET49905445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:55.769000053 CET44549905177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:55.769016027 CET44549905177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:56.184019089 CET50035445192.168.2.893.209.140.205
                                    Jan 14, 2025 20:57:56.189178944 CET4455003593.209.140.205192.168.2.8
                                    Jan 14, 2025 20:57:56.189244032 CET50035445192.168.2.893.209.140.205
                                    Jan 14, 2025 20:57:56.189349890 CET50035445192.168.2.893.209.140.205
                                    Jan 14, 2025 20:57:56.189659119 CET50036445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.194705963 CET4455003693.209.140.1192.168.2.8
                                    Jan 14, 2025 20:57:56.194766998 CET50036445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.194875956 CET50036445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.196158886 CET4455003593.209.140.205192.168.2.8
                                    Jan 14, 2025 20:57:56.200413942 CET4455003693.209.140.1192.168.2.8
                                    Jan 14, 2025 20:57:56.203085899 CET4455003593.209.140.205192.168.2.8
                                    Jan 14, 2025 20:57:56.203130007 CET50035445192.168.2.893.209.140.205
                                    Jan 14, 2025 20:57:56.205352068 CET4455003693.209.140.1192.168.2.8
                                    Jan 14, 2025 20:57:56.205404043 CET50036445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.205538034 CET50037445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.210397005 CET4455003793.209.140.1192.168.2.8
                                    Jan 14, 2025 20:57:56.210448980 CET50037445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.210485935 CET50037445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:57:56.215384007 CET4455003793.209.140.1192.168.2.8
                                    Jan 14, 2025 20:57:56.760710955 CET50038445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:56.765902042 CET44550038156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:56.765995026 CET50038445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:56.780900955 CET50038445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:57:56.785701990 CET44550038156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:57:57.150958061 CET50039445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:57.155833006 CET4455003966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:57.158324003 CET50039445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:57.158364058 CET50039445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:57.163117886 CET4455003966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:57.797138929 CET4454993068.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:57.797276974 CET49930445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:57.797355890 CET49930445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:57.797374964 CET49930445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:57:57.802159071 CET4454993068.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:57.802169085 CET4454993068.199.209.1192.168.2.8
                                    Jan 14, 2025 20:57:57.823095083 CET50040445192.168.2.840.71.191.212
                                    Jan 14, 2025 20:57:57.827929974 CET4455004040.71.191.212192.168.2.8
                                    Jan 14, 2025 20:57:57.827996016 CET50040445192.168.2.840.71.191.212
                                    Jan 14, 2025 20:57:57.828017950 CET50040445192.168.2.840.71.191.212
                                    Jan 14, 2025 20:57:57.828123093 CET50041445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.832905054 CET4455004140.71.191.1192.168.2.8
                                    Jan 14, 2025 20:57:57.832916975 CET4455004040.71.191.212192.168.2.8
                                    Jan 14, 2025 20:57:57.832971096 CET50040445192.168.2.840.71.191.212
                                    Jan 14, 2025 20:57:57.832981110 CET50041445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.833062887 CET50041445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.833415031 CET50042445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.837896109 CET4455004140.71.191.1192.168.2.8
                                    Jan 14, 2025 20:57:57.837950945 CET50041445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.838267088 CET4455004240.71.191.1192.168.2.8
                                    Jan 14, 2025 20:57:57.838344097 CET50042445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.838365078 CET50042445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:57:57.843189001 CET4455004240.71.191.1192.168.2.8
                                    Jan 14, 2025 20:57:58.776740074 CET50043445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:58.791368008 CET4455003966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:58.791451931 CET50039445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:58.791486025 CET50039445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:58.791518927 CET50039445192.168.2.866.248.232.1
                                    Jan 14, 2025 20:57:58.791759968 CET44550043177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:58.791819096 CET50043445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:58.791855097 CET50043445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:57:58.796380997 CET4455003966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:58.796390057 CET4455003966.248.232.1192.168.2.8
                                    Jan 14, 2025 20:57:58.796608925 CET44550043177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:57:58.854255915 CET50044445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.859142065 CET4455004466.248.232.2192.168.2.8
                                    Jan 14, 2025 20:57:58.859229088 CET50044445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.859282017 CET50044445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.859613895 CET50045445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.864217043 CET4455004466.248.232.2192.168.2.8
                                    Jan 14, 2025 20:57:58.864232063 CET4455004466.248.232.2192.168.2.8
                                    Jan 14, 2025 20:57:58.864298105 CET50044445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.864532948 CET4455004566.248.232.2192.168.2.8
                                    Jan 14, 2025 20:57:58.864597082 CET50045445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.864644051 CET50045445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:57:58.869386911 CET4455004566.248.232.2192.168.2.8
                                    Jan 14, 2025 20:57:59.375219107 CET50046445192.168.2.8184.77.186.168
                                    Jan 14, 2025 20:57:59.380321980 CET44550046184.77.186.168192.168.2.8
                                    Jan 14, 2025 20:57:59.380383968 CET50046445192.168.2.8184.77.186.168
                                    Jan 14, 2025 20:57:59.383321047 CET50046445192.168.2.8184.77.186.168
                                    Jan 14, 2025 20:57:59.383563995 CET50047445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.388309956 CET44550046184.77.186.168192.168.2.8
                                    Jan 14, 2025 20:57:59.388370037 CET50046445192.168.2.8184.77.186.168
                                    Jan 14, 2025 20:57:59.388449907 CET44550047184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:57:59.388545036 CET50047445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.388597012 CET50047445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.391113997 CET50048445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.393739939 CET44550047184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:57:59.393858910 CET50047445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.396377087 CET44550048184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:57:59.396445036 CET50048445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.396471977 CET50048445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:57:59.401273012 CET44550048184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:57:59.840086937 CET44549953156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:57:59.840194941 CET49953445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:59.840256929 CET49953445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:59.840318918 CET49953445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:57:59.845072985 CET44549953156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:57:59.845084906 CET44549953156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:58:00.776304007 CET50049445192.168.2.813.249.15.25
                                    Jan 14, 2025 20:58:00.781168938 CET4455004913.249.15.25192.168.2.8
                                    Jan 14, 2025 20:58:00.781265020 CET50049445192.168.2.813.249.15.25
                                    Jan 14, 2025 20:58:00.781325102 CET50049445192.168.2.813.249.15.25
                                    Jan 14, 2025 20:58:00.781483889 CET50050445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.786283970 CET4455005013.249.15.1192.168.2.8
                                    Jan 14, 2025 20:58:00.786341906 CET50050445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.786361933 CET50050445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.786604881 CET4455004913.249.15.25192.168.2.8
                                    Jan 14, 2025 20:58:00.786607027 CET50051445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.786647081 CET50049445192.168.2.813.249.15.25
                                    Jan 14, 2025 20:58:00.792058945 CET4455005013.249.15.1192.168.2.8
                                    Jan 14, 2025 20:58:00.792126894 CET50050445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.792625904 CET4455005113.249.15.1192.168.2.8
                                    Jan 14, 2025 20:58:00.792701006 CET50051445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.792717934 CET50051445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:00.797533035 CET4455005113.249.15.1192.168.2.8
                                    Jan 14, 2025 20:58:00.807161093 CET50052445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:58:00.812087059 CET4455005268.199.209.1192.168.2.8
                                    Jan 14, 2025 20:58:00.812163115 CET50052445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:58:00.812232971 CET50052445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:58:00.816988945 CET4455005268.199.209.1192.168.2.8
                                    Jan 14, 2025 20:58:01.844274998 CET44549978192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:58:01.844352961 CET49978445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:01.844405890 CET49978445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:01.844432116 CET49978445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:01.849318981 CET44549978192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:58:01.849340916 CET44549978192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:58:02.104307890 CET50053445192.168.2.812.213.51.106
                                    Jan 14, 2025 20:58:02.109150887 CET4455005312.213.51.106192.168.2.8
                                    Jan 14, 2025 20:58:02.109251022 CET50053445192.168.2.812.213.51.106
                                    Jan 14, 2025 20:58:02.109312057 CET50053445192.168.2.812.213.51.106
                                    Jan 14, 2025 20:58:02.109474897 CET50054445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.114218950 CET4455005412.213.51.1192.168.2.8
                                    Jan 14, 2025 20:58:02.114275932 CET50054445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.114290953 CET50054445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.114343882 CET4455005312.213.51.106192.168.2.8
                                    Jan 14, 2025 20:58:02.114418030 CET50053445192.168.2.812.213.51.106
                                    Jan 14, 2025 20:58:02.114696026 CET50055445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.119277954 CET4455005412.213.51.1192.168.2.8
                                    Jan 14, 2025 20:58:02.119376898 CET50054445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.119532108 CET4455005512.213.51.1192.168.2.8
                                    Jan 14, 2025 20:58:02.119575977 CET50055445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.119616032 CET50055445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:02.124346972 CET4455005512.213.51.1192.168.2.8
                                    Jan 14, 2025 20:58:02.854751110 CET50056445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:58:02.859549999 CET44550056156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:58:02.859611034 CET50056445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:58:02.859652042 CET50056445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:58:02.864428043 CET44550056156.44.48.1192.168.2.8
                                    Jan 14, 2025 20:58:03.338880062 CET50057445192.168.2.8103.208.156.89
                                    Jan 14, 2025 20:58:03.343868017 CET44550057103.208.156.89192.168.2.8
                                    Jan 14, 2025 20:58:03.343966007 CET50057445192.168.2.8103.208.156.89
                                    Jan 14, 2025 20:58:03.344023943 CET50057445192.168.2.8103.208.156.89
                                    Jan 14, 2025 20:58:03.344136953 CET50058445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.348912954 CET44550057103.208.156.89192.168.2.8
                                    Jan 14, 2025 20:58:03.348937988 CET44550058103.208.156.1192.168.2.8
                                    Jan 14, 2025 20:58:03.348985910 CET50057445192.168.2.8103.208.156.89
                                    Jan 14, 2025 20:58:03.349020958 CET50058445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.349087000 CET50058445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.349337101 CET50059445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.353946924 CET44550058103.208.156.1192.168.2.8
                                    Jan 14, 2025 20:58:03.354007959 CET50058445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.354079008 CET44550059103.208.156.1192.168.2.8
                                    Jan 14, 2025 20:58:03.354129076 CET50059445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.354162931 CET50059445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:03.358879089 CET44550059103.208.156.1192.168.2.8
                                    Jan 14, 2025 20:58:03.826416016 CET44550002177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:58:03.826569080 CET50002445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:03.826611996 CET50002445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:03.826713085 CET50002445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:03.831404924 CET44550002177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:58:03.831521034 CET44550002177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:58:04.000268936 CET44550004160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:58:04.000453949 CET50004445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:58:04.000535965 CET50004445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:58:04.000663042 CET50004445192.168.2.8160.166.147.1
                                    Jan 14, 2025 20:58:04.005697012 CET44550004160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:58:04.005712032 CET44550004160.166.147.1192.168.2.8
                                    Jan 14, 2025 20:58:04.057728052 CET50060445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.062669039 CET44550060160.166.147.2192.168.2.8
                                    Jan 14, 2025 20:58:04.062762022 CET50060445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.068142891 CET50060445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.068706989 CET50061445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.072988033 CET44550060160.166.147.2192.168.2.8
                                    Jan 14, 2025 20:58:04.073051929 CET50060445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.073574066 CET44550061160.166.147.2192.168.2.8
                                    Jan 14, 2025 20:58:04.073636055 CET50061445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.073678970 CET50061445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:04.078439951 CET44550061160.166.147.2192.168.2.8
                                    Jan 14, 2025 20:58:04.495022058 CET50062445192.168.2.8178.96.70.237
                                    Jan 14, 2025 20:58:04.499872923 CET44550062178.96.70.237192.168.2.8
                                    Jan 14, 2025 20:58:04.499980927 CET50062445192.168.2.8178.96.70.237
                                    Jan 14, 2025 20:58:04.500082970 CET50062445192.168.2.8178.96.70.237
                                    Jan 14, 2025 20:58:04.500274897 CET50063445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.505032063 CET44550062178.96.70.237192.168.2.8
                                    Jan 14, 2025 20:58:04.505083084 CET44550063178.96.70.1192.168.2.8
                                    Jan 14, 2025 20:58:04.505109072 CET50062445192.168.2.8178.96.70.237
                                    Jan 14, 2025 20:58:04.505163908 CET50063445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.505235910 CET50063445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.505548954 CET50064445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.510483980 CET44550064178.96.70.1192.168.2.8
                                    Jan 14, 2025 20:58:04.510571003 CET50064445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.510653019 CET50064445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.510688066 CET44550063178.96.70.1192.168.2.8
                                    Jan 14, 2025 20:58:04.510735989 CET50063445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:04.516422033 CET44550064178.96.70.1192.168.2.8
                                    Jan 14, 2025 20:58:04.854091883 CET50065445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:04.859011889 CET44550065192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:58:04.859132051 CET50065445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:04.859602928 CET50065445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:04.864414930 CET44550065192.220.11.1192.168.2.8
                                    Jan 14, 2025 20:58:05.600451946 CET50067445192.168.2.859.104.47.225
                                    Jan 14, 2025 20:58:05.605334997 CET4455006759.104.47.225192.168.2.8
                                    Jan 14, 2025 20:58:05.608053923 CET50067445192.168.2.859.104.47.225
                                    Jan 14, 2025 20:58:05.609849930 CET50068445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.610099077 CET50067445192.168.2.859.104.47.225
                                    Jan 14, 2025 20:58:05.614681959 CET4455006859.104.47.1192.168.2.8
                                    Jan 14, 2025 20:58:05.614777088 CET50068445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.615211964 CET4455006759.104.47.225192.168.2.8
                                    Jan 14, 2025 20:58:05.615288973 CET50067445192.168.2.859.104.47.225
                                    Jan 14, 2025 20:58:05.618944883 CET50068445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.619337082 CET50069445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.623764992 CET4455006859.104.47.1192.168.2.8
                                    Jan 14, 2025 20:58:05.623825073 CET50068445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.624258041 CET4455006959.104.47.1192.168.2.8
                                    Jan 14, 2025 20:58:05.624315977 CET50069445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.627361059 CET50069445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:05.632155895 CET4455006959.104.47.1192.168.2.8
                                    Jan 14, 2025 20:58:05.871494055 CET4455001167.23.172.1192.168.2.8
                                    Jan 14, 2025 20:58:05.871546984 CET50011445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:05.871815920 CET50011445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:05.871815920 CET50011445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:05.876604080 CET4455001167.23.172.1192.168.2.8
                                    Jan 14, 2025 20:58:05.876614094 CET4455001167.23.172.1192.168.2.8
                                    Jan 14, 2025 20:58:06.588773966 CET50070445192.168.2.879.219.208.52
                                    Jan 14, 2025 20:58:06.593586922 CET4455007079.219.208.52192.168.2.8
                                    Jan 14, 2025 20:58:06.593677998 CET50070445192.168.2.879.219.208.52
                                    Jan 14, 2025 20:58:06.593729973 CET50070445192.168.2.879.219.208.52
                                    Jan 14, 2025 20:58:06.593940020 CET50071445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.598767042 CET4455007079.219.208.52192.168.2.8
                                    Jan 14, 2025 20:58:06.598779917 CET4455007179.219.208.1192.168.2.8
                                    Jan 14, 2025 20:58:06.598834038 CET50070445192.168.2.879.219.208.52
                                    Jan 14, 2025 20:58:06.598870039 CET50071445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.598974943 CET50071445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.599275112 CET50072445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.603777885 CET4455007179.219.208.1192.168.2.8
                                    Jan 14, 2025 20:58:06.603861094 CET50071445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.604033947 CET4455007279.219.208.1192.168.2.8
                                    Jan 14, 2025 20:58:06.604083061 CET50072445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.604114056 CET50072445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:06.608809948 CET4455007279.219.208.1192.168.2.8
                                    Jan 14, 2025 20:58:06.838542938 CET50073445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:06.843381882 CET44550073177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:58:06.843499899 CET50073445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:06.843580008 CET50073445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:06.848448992 CET44550073177.103.120.1192.168.2.8
                                    Jan 14, 2025 20:58:07.526411057 CET50074445192.168.2.8151.35.63.186
                                    Jan 14, 2025 20:58:07.531342030 CET44550074151.35.63.186192.168.2.8
                                    Jan 14, 2025 20:58:07.534182072 CET50074445192.168.2.8151.35.63.186
                                    Jan 14, 2025 20:58:07.534197092 CET50074445192.168.2.8151.35.63.186
                                    Jan 14, 2025 20:58:07.534399033 CET50075445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.539180040 CET44550075151.35.63.1192.168.2.8
                                    Jan 14, 2025 20:58:07.539263964 CET50075445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.539469004 CET44550074151.35.63.186192.168.2.8
                                    Jan 14, 2025 20:58:07.539506912 CET50076445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.539529085 CET50075445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.540075064 CET50074445192.168.2.8151.35.63.186
                                    Jan 14, 2025 20:58:07.544392109 CET44550076151.35.63.1192.168.2.8
                                    Jan 14, 2025 20:58:07.544482946 CET50076445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.544512033 CET50076445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.544539928 CET44550075151.35.63.1192.168.2.8
                                    Jan 14, 2025 20:58:07.544590950 CET50075445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:07.549406052 CET44550076151.35.63.1192.168.2.8
                                    Jan 14, 2025 20:58:07.924045086 CET44550015156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:58:07.928158045 CET50015445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:07.928194046 CET50015445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:07.928240061 CET50015445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:07.933218956 CET44550015156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:58:07.933264971 CET44550015156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:58:08.090548038 CET445500169.81.42.1192.168.2.8
                                    Jan 14, 2025 20:58:08.090640068 CET50016445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:58:08.090681076 CET50016445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:58:08.090763092 CET50016445192.168.2.89.81.42.1
                                    Jan 14, 2025 20:58:08.095693111 CET445500169.81.42.1192.168.2.8
                                    Jan 14, 2025 20:58:08.095730066 CET445500169.81.42.1192.168.2.8
                                    Jan 14, 2025 20:58:08.152349949 CET50077445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.157390118 CET445500779.81.42.2192.168.2.8
                                    Jan 14, 2025 20:58:08.157471895 CET50077445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.157555103 CET50077445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.158107996 CET50078445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.162554979 CET445500779.81.42.2192.168.2.8
                                    Jan 14, 2025 20:58:08.162616968 CET50077445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.162970066 CET445500789.81.42.2192.168.2.8
                                    Jan 14, 2025 20:58:08.163028955 CET50078445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.163084030 CET50078445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:08.167913914 CET445500789.81.42.2192.168.2.8
                                    Jan 14, 2025 20:58:08.416938066 CET50079445192.168.2.8158.12.16.92
                                    Jan 14, 2025 20:58:08.422535896 CET44550079158.12.16.92192.168.2.8
                                    Jan 14, 2025 20:58:08.422636032 CET50079445192.168.2.8158.12.16.92
                                    Jan 14, 2025 20:58:08.425273895 CET50079445192.168.2.8158.12.16.92
                                    Jan 14, 2025 20:58:08.425482035 CET50080445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.430212021 CET44550079158.12.16.92192.168.2.8
                                    Jan 14, 2025 20:58:08.430284023 CET44550080158.12.16.1192.168.2.8
                                    Jan 14, 2025 20:58:08.430294037 CET50079445192.168.2.8158.12.16.92
                                    Jan 14, 2025 20:58:08.430349112 CET50080445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.430423975 CET50080445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.435187101 CET50081445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.435306072 CET44550080158.12.16.1192.168.2.8
                                    Jan 14, 2025 20:58:08.435359001 CET50080445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.440170050 CET44550081158.12.16.1192.168.2.8
                                    Jan 14, 2025 20:58:08.440239906 CET50081445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.442071915 CET50081445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:08.446886063 CET44550081158.12.16.1192.168.2.8
                                    Jan 14, 2025 20:58:08.885634899 CET50082445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:08.890566111 CET4455008267.23.172.1192.168.2.8
                                    Jan 14, 2025 20:58:08.890635014 CET50082445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:08.890732050 CET50082445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:08.895452976 CET4455008267.23.172.1192.168.2.8
                                    Jan 14, 2025 20:58:09.245099068 CET50083445192.168.2.8168.200.116.184
                                    Jan 14, 2025 20:58:09.249923944 CET44550083168.200.116.184192.168.2.8
                                    Jan 14, 2025 20:58:09.250042915 CET50083445192.168.2.8168.200.116.184
                                    Jan 14, 2025 20:58:09.250061989 CET50083445192.168.2.8168.200.116.184
                                    Jan 14, 2025 20:58:09.252067089 CET50084445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.254962921 CET44550083168.200.116.184192.168.2.8
                                    Jan 14, 2025 20:58:09.255012035 CET50083445192.168.2.8168.200.116.184
                                    Jan 14, 2025 20:58:09.256859064 CET44550084168.200.116.1192.168.2.8
                                    Jan 14, 2025 20:58:09.257086992 CET50084445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.257086992 CET50084445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.257327080 CET50085445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.262129068 CET44550085168.200.116.1192.168.2.8
                                    Jan 14, 2025 20:58:09.262223959 CET50085445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.262280941 CET44550084168.200.116.1192.168.2.8
                                    Jan 14, 2025 20:58:09.262307882 CET50085445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.264108896 CET50084445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:09.267035007 CET44550085168.200.116.1192.168.2.8
                                    Jan 14, 2025 20:58:09.922585964 CET4455001973.40.250.1192.168.2.8
                                    Jan 14, 2025 20:58:09.922683954 CET50019445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:09.922724962 CET50019445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:09.922772884 CET50019445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:09.927548885 CET4455001973.40.250.1192.168.2.8
                                    Jan 14, 2025 20:58:09.927560091 CET4455001973.40.250.1192.168.2.8
                                    Jan 14, 2025 20:58:10.010737896 CET50086445192.168.2.849.34.181.175
                                    Jan 14, 2025 20:58:10.015599012 CET4455008649.34.181.175192.168.2.8
                                    Jan 14, 2025 20:58:10.015666962 CET50086445192.168.2.849.34.181.175
                                    Jan 14, 2025 20:58:10.015701056 CET50086445192.168.2.849.34.181.175
                                    Jan 14, 2025 20:58:10.015856981 CET50087445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.020813942 CET4455008749.34.181.1192.168.2.8
                                    Jan 14, 2025 20:58:10.020885944 CET50087445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.020911932 CET50087445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.021078110 CET4455008649.34.181.175192.168.2.8
                                    Jan 14, 2025 20:58:10.021116972 CET50086445192.168.2.849.34.181.175
                                    Jan 14, 2025 20:58:10.021243095 CET50088445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.025830984 CET4455008749.34.181.1192.168.2.8
                                    Jan 14, 2025 20:58:10.025877953 CET50087445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.025990963 CET4455008849.34.181.1192.168.2.8
                                    Jan 14, 2025 20:58:10.026038885 CET50088445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.026068926 CET50088445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:10.030827999 CET4455008849.34.181.1192.168.2.8
                                    Jan 14, 2025 20:58:10.059226036 CET4455002060.237.150.1192.168.2.8
                                    Jan 14, 2025 20:58:10.059289932 CET50020445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:58:10.059345961 CET50020445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:58:10.059396982 CET50020445192.168.2.860.237.150.1
                                    Jan 14, 2025 20:58:10.064228058 CET4455002060.237.150.1192.168.2.8
                                    Jan 14, 2025 20:58:10.064239979 CET4455002060.237.150.1192.168.2.8
                                    Jan 14, 2025 20:58:10.119930983 CET50089445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.124820948 CET4455008960.237.150.2192.168.2.8
                                    Jan 14, 2025 20:58:10.124914885 CET50089445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.125097036 CET50089445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.125437975 CET50090445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.129915953 CET4455008960.237.150.2192.168.2.8
                                    Jan 14, 2025 20:58:10.129980087 CET50089445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.130249023 CET4455009060.237.150.2192.168.2.8
                                    Jan 14, 2025 20:58:10.130307913 CET50090445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.130367994 CET50090445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:10.135471106 CET4455009060.237.150.2192.168.2.8
                                    Jan 14, 2025 20:58:10.469237089 CET44550022103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:58:10.469330072 CET50022445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:10.469474077 CET50022445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:10.469599009 CET50022445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:10.474292040 CET44550022103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:58:10.474318981 CET44550022103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:58:10.932686090 CET50092445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:10.937675953 CET44550092156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:58:10.937829971 CET50092445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:10.942715883 CET50092445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:10.947571039 CET44550092156.188.231.1192.168.2.8
                                    Jan 14, 2025 20:58:11.965437889 CET44550025122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:58:11.965518951 CET50025445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:11.965558052 CET50025445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:11.965609074 CET50025445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:11.970432043 CET44550025122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:58:11.970448971 CET44550025122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:58:12.230986118 CET4455002618.102.248.1192.168.2.8
                                    Jan 14, 2025 20:58:12.231137037 CET50026445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:58:12.231225014 CET50026445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:58:12.231287956 CET50026445192.168.2.818.102.248.1
                                    Jan 14, 2025 20:58:12.235963106 CET4455002618.102.248.1192.168.2.8
                                    Jan 14, 2025 20:58:12.236032009 CET4455002618.102.248.1192.168.2.8
                                    Jan 14, 2025 20:58:12.292717934 CET50096445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.297605991 CET4455009618.102.248.2192.168.2.8
                                    Jan 14, 2025 20:58:12.297677040 CET50096445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.297831059 CET50096445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.299344063 CET50097445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.302737951 CET4455009618.102.248.2192.168.2.8
                                    Jan 14, 2025 20:58:12.302792072 CET50096445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.304178953 CET4455009718.102.248.2192.168.2.8
                                    Jan 14, 2025 20:58:12.304241896 CET50097445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.304291010 CET50097445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:12.309062004 CET4455009718.102.248.2192.168.2.8
                                    Jan 14, 2025 20:58:12.932223082 CET50100445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:12.937298059 CET4455010073.40.250.1192.168.2.8
                                    Jan 14, 2025 20:58:12.937436104 CET50100445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:12.937473059 CET50100445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:12.942325115 CET4455010073.40.250.1192.168.2.8
                                    Jan 14, 2025 20:58:13.479095936 CET50104445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:13.484055996 CET44550104103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:58:13.484143019 CET50104445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:13.484162092 CET50104445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:13.488979101 CET44550104103.42.227.2192.168.2.8
                                    Jan 14, 2025 20:58:14.091156006 CET44550030154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:58:14.091233015 CET50030445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:58:14.091464043 CET50030445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:58:14.091675043 CET50030445192.168.2.8154.83.180.1
                                    Jan 14, 2025 20:58:14.096307039 CET44550030154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:58:14.096539021 CET44550030154.83.180.1192.168.2.8
                                    Jan 14, 2025 20:58:14.234160900 CET50110445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.239193916 CET44550110154.83.180.2192.168.2.8
                                    Jan 14, 2025 20:58:14.239255905 CET50110445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.239545107 CET50110445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.240408897 CET50111445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.244724989 CET44550110154.83.180.2192.168.2.8
                                    Jan 14, 2025 20:58:14.244788885 CET50110445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.245598078 CET44550111154.83.180.2192.168.2.8
                                    Jan 14, 2025 20:58:14.245671034 CET50111445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.245925903 CET50111445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:14.251132965 CET44550111154.83.180.2192.168.2.8
                                    Jan 14, 2025 20:58:14.979265928 CET50118445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:14.984210014 CET44550118122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:58:14.984291077 CET50118445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:14.984324932 CET50118445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:14.989295959 CET44550118122.134.47.1192.168.2.8
                                    Jan 14, 2025 20:58:15.829173088 CET44550033145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:58:15.829246998 CET50033445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:15.829288960 CET50033445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:15.829314947 CET50033445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:15.834194899 CET44550033145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:58:15.834206104 CET44550033145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:58:16.045695066 CET4455003465.6.116.1192.168.2.8
                                    Jan 14, 2025 20:58:16.045762062 CET50034445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:58:16.045788050 CET50034445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:58:16.045823097 CET50034445192.168.2.865.6.116.1
                                    Jan 14, 2025 20:58:16.050637007 CET4455003465.6.116.1192.168.2.8
                                    Jan 14, 2025 20:58:16.050651073 CET4455003465.6.116.1192.168.2.8
                                    Jan 14, 2025 20:58:16.106864929 CET50130445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.111778975 CET4455013065.6.116.2192.168.2.8
                                    Jan 14, 2025 20:58:16.111882925 CET50130445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.112047911 CET50130445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.114109039 CET50131445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.116966009 CET4455013065.6.116.2192.168.2.8
                                    Jan 14, 2025 20:58:16.117063046 CET50130445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.118928909 CET4455013165.6.116.2192.168.2.8
                                    Jan 14, 2025 20:58:16.119004965 CET50131445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.119035006 CET50131445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:16.123850107 CET4455013165.6.116.2192.168.2.8
                                    Jan 14, 2025 20:58:17.594757080 CET4455003793.209.140.1192.168.2.8
                                    Jan 14, 2025 20:58:17.594861984 CET50037445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:58:17.594907045 CET50037445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:58:17.594961882 CET50037445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:58:17.599762917 CET4455003793.209.140.1192.168.2.8
                                    Jan 14, 2025 20:58:17.599783897 CET4455003793.209.140.1192.168.2.8
                                    Jan 14, 2025 20:58:18.139434099 CET44550038156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:58:18.139544964 CET50038445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:58:18.139579058 CET50038445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:58:18.139628887 CET50038445192.168.2.8156.101.233.1
                                    Jan 14, 2025 20:58:18.144444942 CET44550038156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:58:18.144471884 CET44550038156.101.233.1192.168.2.8
                                    Jan 14, 2025 20:58:18.214859962 CET50166445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.219829082 CET44550166156.101.233.2192.168.2.8
                                    Jan 14, 2025 20:58:18.219918966 CET50166445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.220011950 CET50166445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.220292091 CET50168445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.225450993 CET44550168156.101.233.2192.168.2.8
                                    Jan 14, 2025 20:58:18.225555897 CET50168445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.225578070 CET50168445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.225642920 CET44550166156.101.233.2192.168.2.8
                                    Jan 14, 2025 20:58:18.225775003 CET50166445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:18.230320930 CET44550168156.101.233.2192.168.2.8
                                    Jan 14, 2025 20:58:18.838547945 CET50182445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:18.843597889 CET44550182145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:58:18.846734047 CET50182445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:18.846760035 CET50182445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:18.851751089 CET44550182145.132.230.1192.168.2.8
                                    Jan 14, 2025 20:58:19.217396975 CET4455004240.71.191.1192.168.2.8
                                    Jan 14, 2025 20:58:19.217480898 CET50042445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:58:19.217823029 CET50042445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:58:19.217864990 CET50042445192.168.2.840.71.191.1
                                    Jan 14, 2025 20:58:19.222603083 CET4455004240.71.191.1192.168.2.8
                                    Jan 14, 2025 20:58:19.222635984 CET4455004240.71.191.1192.168.2.8
                                    Jan 14, 2025 20:58:20.139131069 CET44550043177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:58:20.139411926 CET50043445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:58:20.139411926 CET50043445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:58:20.139411926 CET50043445192.168.2.8177.247.109.1
                                    Jan 14, 2025 20:58:20.144263983 CET44550043177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:58:20.144279957 CET44550043177.247.109.1192.168.2.8
                                    Jan 14, 2025 20:58:20.197949886 CET50224445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.202847004 CET44550224177.247.109.2192.168.2.8
                                    Jan 14, 2025 20:58:20.202949047 CET50224445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.203027010 CET50224445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.203416109 CET50225445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.207974911 CET44550224177.247.109.2192.168.2.8
                                    Jan 14, 2025 20:58:20.208045006 CET50224445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.208256960 CET44550225177.247.109.2192.168.2.8
                                    Jan 14, 2025 20:58:20.208332062 CET50225445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.208369017 CET50225445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:20.213119984 CET44550225177.247.109.2192.168.2.8
                                    Jan 14, 2025 20:58:20.233011007 CET4455004566.248.232.2192.168.2.8
                                    Jan 14, 2025 20:58:20.233124971 CET50045445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:58:20.233149052 CET50045445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:58:20.233189106 CET50045445192.168.2.866.248.232.2
                                    Jan 14, 2025 20:58:20.237989902 CET4455004566.248.232.2192.168.2.8
                                    Jan 14, 2025 20:58:20.238003969 CET4455004566.248.232.2192.168.2.8
                                    Jan 14, 2025 20:58:20.604357958 CET50243445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:58:20.609203100 CET4455024393.209.140.1192.168.2.8
                                    Jan 14, 2025 20:58:20.609292984 CET50243445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:58:20.609306097 CET50243445192.168.2.893.209.140.1
                                    Jan 14, 2025 20:58:20.614231110 CET4455024393.209.140.1192.168.2.8
                                    Jan 14, 2025 20:58:20.793605089 CET44550048184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:58:20.793704987 CET50048445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:58:20.793745041 CET50048445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:58:20.793790102 CET50048445192.168.2.8184.77.186.1
                                    Jan 14, 2025 20:58:20.798676014 CET44550048184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:58:20.798690081 CET44550048184.77.186.1192.168.2.8
                                    Jan 14, 2025 20:58:22.168715954 CET4455005113.249.15.1192.168.2.8
                                    Jan 14, 2025 20:58:22.168770075 CET50051445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:22.204948902 CET4455005268.199.209.1192.168.2.8
                                    Jan 14, 2025 20:58:22.205005884 CET50052445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:58:23.010714054 CET50061445192.168.2.8160.166.147.2
                                    Jan 14, 2025 20:58:23.010761976 CET50081445192.168.2.8158.12.16.1
                                    Jan 14, 2025 20:58:23.010874033 CET50092445192.168.2.8156.188.231.1
                                    Jan 14, 2025 20:58:23.010937929 CET50131445192.168.2.865.6.116.2
                                    Jan 14, 2025 20:58:23.010960102 CET50097445192.168.2.818.102.248.2
                                    Jan 14, 2025 20:58:23.010963917 CET50100445192.168.2.873.40.250.1
                                    Jan 14, 2025 20:58:23.011006117 CET50052445192.168.2.868.199.209.1
                                    Jan 14, 2025 20:58:23.011032104 CET50051445192.168.2.813.249.15.1
                                    Jan 14, 2025 20:58:23.011061907 CET50056445192.168.2.8156.44.48.1
                                    Jan 14, 2025 20:58:23.011075974 CET50055445192.168.2.812.213.51.1
                                    Jan 14, 2025 20:58:23.011105061 CET50059445192.168.2.8103.208.156.1
                                    Jan 14, 2025 20:58:23.011128902 CET50064445192.168.2.8178.96.70.1
                                    Jan 14, 2025 20:58:23.011209965 CET50069445192.168.2.859.104.47.1
                                    Jan 14, 2025 20:58:23.011250973 CET50065445192.168.2.8192.220.11.1
                                    Jan 14, 2025 20:58:23.011250973 CET50072445192.168.2.879.219.208.1
                                    Jan 14, 2025 20:58:23.011256933 CET50073445192.168.2.8177.103.120.1
                                    Jan 14, 2025 20:58:23.011281013 CET50076445192.168.2.8151.35.63.1
                                    Jan 14, 2025 20:58:23.011297941 CET50078445192.168.2.89.81.42.2
                                    Jan 14, 2025 20:58:23.011323929 CET50082445192.168.2.867.23.172.1
                                    Jan 14, 2025 20:58:23.011351109 CET50085445192.168.2.8168.200.116.1
                                    Jan 14, 2025 20:58:23.011374950 CET50088445192.168.2.849.34.181.1
                                    Jan 14, 2025 20:58:23.011393070 CET50090445192.168.2.860.237.150.2
                                    Jan 14, 2025 20:58:23.011409998 CET50104445192.168.2.8103.42.227.2
                                    Jan 14, 2025 20:58:23.011431932 CET50111445192.168.2.8154.83.180.2
                                    Jan 14, 2025 20:58:23.011450052 CET50118445192.168.2.8122.134.47.1
                                    Jan 14, 2025 20:58:23.011492968 CET50168445192.168.2.8156.101.233.2
                                    Jan 14, 2025 20:58:23.011533022 CET50182445192.168.2.8145.132.230.1
                                    Jan 14, 2025 20:58:23.011650085 CET50225445192.168.2.8177.247.109.2
                                    Jan 14, 2025 20:58:23.011878014 CET50243445192.168.2.893.209.140.1
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 20:57:16.155262947 CET5954253192.168.2.81.1.1.1
                                    Jan 14, 2025 20:57:16.165076017 CET53595421.1.1.1192.168.2.8
                                    Jan 14, 2025 20:57:53.375113010 CET138138192.168.2.8192.168.2.255
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 14, 2025 20:57:16.155262947 CET192.168.2.81.1.1.10xab04Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 14, 2025 20:57:16.165076017 CET1.1.1.1192.168.2.80xab04No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                    Jan 14, 2025 20:57:16.165076017 CET1.1.1.1192.168.2.80xab04No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                    • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.849704104.16.167.228807048C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 14, 2025 20:57:16.175786018 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 14, 2025 20:57:16.678628922 CET778INHTTP/1.1 200 OK
                                    Date: Tue, 14 Jan 2025 19:57:16 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 902031b2bd96430f-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.849705104.16.167.228805852C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 14, 2025 20:57:17.653594017 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 14, 2025 20:57:18.171195030 CET778INHTTP/1.1 200 OK
                                    Date: Tue, 14 Jan 2025 19:57:18 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 902031bbdcf40f8d-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.849714104.16.167.228804612C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 14, 2025 20:57:18.481518984 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 14, 2025 20:57:18.952342033 CET778INHTTP/1.1 200 OK
                                    Date: Tue, 14 Jan 2025 19:57:18 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 902031c10fff72ad-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:14:57:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll"
                                    Imagebase:0x3d0000
                                    File size:126'464 bytes
                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:14:57:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6ee680000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:14:57:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1
                                    Imagebase:0xa40000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:14:57:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\k6fBkyS1R6.dll,PlayGame
                                    Imagebase:0x4c0000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:14:57:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",#1
                                    Imagebase:0x4c0000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:14:57:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:53E887584F552941244D293433ED9F30
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1483963357.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1484233994.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1484233994.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:8
                                    Start time:14:57:16
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:53E887584F552941244D293433ED9F30
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1500069157.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2148895051.0000000001EC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2148895051.0000000001EC8000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2149290040.00000000023F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2149290040.00000000023F8000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1500365419.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1500365419.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:9
                                    Start time:14:57:17
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\k6fBkyS1R6.dll",PlayGame
                                    Imagebase:0x4c0000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:14:57:17
                                    Start date:14/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:FAE2EB3636050E9697B9B8DDDB47E1CA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1512413486.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 97%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:11
                                    Start time:14:57:17
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:53E887584F552941244D293433ED9F30
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1521308563.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1512692457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1512513214.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1521464297.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1521464297.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:12
                                    Start time:14:57:18
                                    Start date:14/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:FAE2EB3636050E9697B9B8DDDB47E1CA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1520311924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1520794721.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:71.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:64.9%
                                      Total number of Nodes:37
                                      Total number of Limit Nodes:9

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                      • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                      • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                      • CreateProcessA.KERNELBASE ref: 00407EE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                      • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1513572858.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1513552159.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513593450.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513681011.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4281112323-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1513572858.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1513552159.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513593450.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513681011.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1513572858.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1513552159.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513593450.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513681011.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                      • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1513572858.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1513552159.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513593450.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513681011.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1513572858.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1513552159.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513593450.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513614042.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513681011.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1513770518.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Execution Graph

                                      Execution Coverage:34.9%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:35
                                      Total number of Limit Nodes:2

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2147486074.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2147466098.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147520656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147700529.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147721154.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2147486074.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2147466098.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147520656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147700529.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147721154.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                      • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2147486074.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2147466098.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147520656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147700529.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147721154.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2147486074.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2147466098.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147520656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147700529.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147721154.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4072214828-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2147486074.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2147466098.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147520656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147591907.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147662016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147700529.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147721154.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2147820836.0000000000A2E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                      APIs
                                      • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: /../$/..\$\../$\..\
                                      • API String ID: 3510742995-3885502717
                                      • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                      • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                      • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                      • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                      • API String ID: 2238633743-2459060434
                                      • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                      • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                      APIs
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                      • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$ManagerStart
                                      • String ID: cmd.exe /c "%s"
                                      • API String ID: 1485051382-955883872
                                      • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                      • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                      • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                      • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow$memcpy
                                      • String ID:
                                      • API String ID: 1881450474-3916222277
                                      • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                      • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                      • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                      • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                      • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                      • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                      • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                      • String ID: WANACRY!
                                      • API String ID: 283026544-1240840912
                                      • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                      • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                      • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                      • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID: $Q;@
                                      • API String ID: 2382887404-262343263
                                      • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                      • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                      • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                      • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-3916222277
                                      • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                      • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                      • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                      • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                      APIs
                                      • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                      • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$FreeProcessfree
                                      • String ID:
                                      • API String ID: 3428986607-0
                                      • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                      • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                      • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                      • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                      • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                      • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                      • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                      APIs
                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ContextCryptRelease
                                      • String ID:
                                      • API String ID: 829835001-0
                                      • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                      • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                      • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                      • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                      APIs
                                        • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                      • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                      • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                      • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                      • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                      • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                      • API String ID: 2238633743-1294736154
                                      • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                      • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: %s%s$%s%s%s$:$\
                                      • API String ID: 0-1100577047
                                      • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                      • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                      • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                      • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                      APIs
                                      • __p___argv.MSVCRT(0040F538), ref: 00402040
                                      • strcmp.MSVCRT(?), ref: 0040204B
                                      • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                      • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                        • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                      • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                      • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                      • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                        • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                        • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                        • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                        • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                      • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                      • API String ID: 1074704982-2844324180
                                      • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                      • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                      • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                      • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                      APIs
                                      • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                      • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                      • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                      • strlen.MSVCRT(?), ref: 004011A7
                                      • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                      • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                      • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                      • String ID: 0@$Software\$WanaCrypt0r
                                      • API String ID: 865909632-3421300005
                                      • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                      • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                      • String ID: %s\Intel$%s\ProgramData
                                      • API String ID: 3806094219-198707228
                                      • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                      • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                      APIs
                                        • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                      • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                      • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                      • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                        • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                      • SetLastError.KERNEL32(0000045A), ref: 00402430
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                      • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                      • API String ID: 1900561814-3657104962
                                      • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                      • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                      • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                      • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                      APIs
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                      • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                      • String ID: %s\%s
                                      • API String ID: 1036847564-4073750446
                                      • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                      • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                      APIs
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                      • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                      • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                      • CloseHandle.KERNEL32(?), ref: 004010EC
                                      • CloseHandle.KERNEL32(?), ref: 004010F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                      • String ID: D
                                      • API String ID: 786732093-2746444292
                                      • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                      • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                      APIs
                                      • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                      • __p__fmode.MSVCRT ref: 004077FC
                                      • __p__commode.MSVCRT ref: 0040780A
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                      • String ID:
                                      • API String ID: 3626615345-0
                                      • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                      • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                      • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                      • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                      APIs
                                      • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                        • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                      • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                      • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                      • String ID:
                                      • API String ID: 2141228402-0
                                      • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                      • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                      • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                      • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                      APIs
                                      • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                      • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                      • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Read$realloc
                                      • String ID: ?!@
                                      • API String ID: 1241503663-708128716
                                      • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                      • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: rand$wcslen$ComputerNamesrand
                                      • String ID:
                                      • API String ID: 3058258771-0
                                      • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                      • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                      APIs
                                      • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                      • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                      • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                      • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                      • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                      • String ID:
                                      • API String ID: 2935503933-0
                                      • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                      • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                      • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                      • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                      APIs
                                      • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                      • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                      • Sleep.KERNEL32(000003E8), ref: 00401F40
                                      • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleMutexOpenSleepsprintf
                                      • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                      • API String ID: 2780352083-2959021817
                                      • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                      • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-0
                                      • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                      • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                      • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                      • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                      APIs
                                      • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                      • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                      • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                      • fclose.MSVCRT(00000000), ref: 00401058
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefopenfreadfwrite
                                      • String ID: c.wnry
                                      • API String ID: 4000964834-3240288721
                                      • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                      • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                      • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                      • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                      • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                      • String ID:
                                      • API String ID: 2811923685-0
                                      • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                      • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                      • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                      • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Pointer$??2@Create
                                      • String ID:
                                      • API String ID: 1331958074-0
                                      • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                      • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                      APIs
                                      • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                      • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast_stricmp
                                      • String ID: P!@
                                      • API String ID: 1278613211-1774101457
                                      • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                      • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                      • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                      • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                      APIs
                                      • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                      • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesFilestrcmp
                                      • String ID: c.wnry
                                      • API String ID: 3324900478-3240288721
                                      • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                      • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                      • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                      • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                      APIs
                                      • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                      • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??3@CloseHandle
                                      • String ID: $l@
                                      • API String ID: 3816424416-2140230165
                                      • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                      • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                      • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                      • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                      • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1513058698.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1513038348.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513080224.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513100277.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000005AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1513122116.000000000071E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalSection$Leave$Entermemcpy
                                      • String ID:
                                      • API String ID: 3435569088-0
                                      • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                      • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                      • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                      • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65