Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Yx3rRuVx3c.dll

Overview

General Information

Sample name:Yx3rRuVx3c.dll
renamed because original name is a hash value
Original sample name:86af4a27e3caa42dbb67c93077d6c202.dll
Analysis ID:1591283
MD5:86af4a27e3caa42dbb67c93077d6c202
SHA1:db4b121f4a8e7b489ebc7d8f25a80ae22a824cd5
SHA256:ab56af6d0e81904633fc06450b8d48b503be33924736eee269fd0f4776d590cc
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6064 cmdline: loaddll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3276 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5500 cmdline: rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4152 cmdline: rundll32.exe C:\Users\user\Desktop\Yx3rRuVx3c.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 3404 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 281BE5C102C0A2BB6061B3DE31E0EDCF)
        • tasksche.exe (PID: 1888 cmdline: C:\WINDOWS\tasksche.exe /i MD5: B058C1426BA4967961EBB505C1E7ECC6)
    • rundll32.exe (PID: 5800 cmdline: rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 6816 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 281BE5C102C0A2BB6061B3DE31E0EDCF)
        • tasksche.exe (PID: 5612 cmdline: C:\WINDOWS\tasksche.exe /i MD5: B058C1426BA4967961EBB505C1E7ECC6)
  • mssecsvc.exe (PID: 2384 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 281BE5C102C0A2BB6061B3DE31E0EDCF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Yx3rRuVx3c.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    Yx3rRuVx3c.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    Yx3rRuVx3c.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\mssecsvc.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0x3136c:$x3: tasksche.exe
      • 0x4157c:$x3: tasksche.exe
      • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0x415d0:$x5: WNcry@2ol7
      • 0x313d7:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
      • 0xe048:$x7: mssecsvc.exe
      • 0x17350:$x7: mssecsvc.exe
      • 0x31344:$x8: C:\%s\qeriuwjhrf
      • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xe034:$s1: C:\%s\%s
      • 0x17338:$s1: C:\%s\%s
      • 0x31358:$s1: C:\%s\%s
      • 0x414d0:$s3: cmd.exe /c "%s"
      • 0x73a24:$s4: msg/m_portuguese.wnry
      • 0x2e68c:$s5: \\192.168.56.20\IPC$
      • 0x1ba81:$s6: \\172.16.99.5\IPC$
      • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
      • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
      • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
      • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      C:\Windows\mssecsvc.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
      • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
      • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
      • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
      • 0x1d439:$s1: __TREEID__PLACEHOLDER__
      • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
      • 0x1f508:$s1: __TREEID__PLACEHOLDER__
      • 0x20570:$s1: __TREEID__PLACEHOLDER__
      • 0x215d8:$s1: __TREEID__PLACEHOLDER__
      • 0x22640:$s1: __TREEID__PLACEHOLDER__
      • 0x236a8:$s1: __TREEID__PLACEHOLDER__
      • 0x24710:$s1: __TREEID__PLACEHOLDER__
      • 0x25778:$s1: __TREEID__PLACEHOLDER__
      • 0x267e0:$s1: __TREEID__PLACEHOLDER__
      • 0x27848:$s1: __TREEID__PLACEHOLDER__
      • 0x288b0:$s1: __TREEID__PLACEHOLDER__
      • 0x29918:$s1: __TREEID__PLACEHOLDER__
      • 0x2a980:$s1: __TREEID__PLACEHOLDER__
      • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
      • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e340:$s1: __TREEID__PLACEHOLDER__
      C:\Windows\mssecsvc.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvc.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
      • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
      • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      Click to see the 4 entries
      SourceRuleDescriptionAuthorStrings
      0000000B.00000000.1489242948.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000006.00000000.1462495225.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.23d08c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvc.exe.1eb3084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              11.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                11.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                11.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 135 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:05.467399+010020315153Misc activity104.16.167.22880192.168.2.849704TCP
                2025-01-14T21:11:06.745376+010020315153Misc activity104.16.167.22880192.168.2.849705TCP
                2025-01-14T21:11:07.717309+010020315153Misc activity104.16.167.22880192.168.2.849717TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:04.945759+010020242911A Network Trojan was detected192.168.2.8584511.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:05.467305+010020242981A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T21:11:06.745291+010020242981A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T21:11:07.717150+010020242981A Network Trojan was detected192.168.2.849717104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:05.467305+010020242991A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T21:11:06.745291+010020242991A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T21:11:07.717150+010020242991A Network Trojan was detected192.168.2.849717104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:05.467305+010020243011A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T21:11:06.745291+010020243011A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T21:11:07.717150+010020243011A Network Trojan was detected192.168.2.849717104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:05.467305+010020243021A Network Trojan was detected192.168.2.849704104.16.167.22880TCP
                2025-01-14T21:11:06.745291+010020243021A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-14T21:11:07.717150+010020243021A Network Trojan was detected192.168.2.849717104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:05.467305+010028033043Unknown Traffic192.168.2.849704104.16.167.22880TCP
                2025-01-14T21:11:06.745291+010028033043Unknown Traffic192.168.2.849705104.16.167.22880TCP
                2025-01-14T21:11:07.717150+010028033043Unknown Traffic192.168.2.849717104.16.167.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Yx3rRuVx3c.dllAvira: detected
                Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 89%
                Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 97%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 89%
                Source: Yx3rRuVx3c.dllReversingLabs: Detection: 94%
                Source: Yx3rRuVx3c.dllVirustotal: Detection: 90%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: Yx3rRuVx3c.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: Yx3rRuVx3c.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49717 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49717 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49717 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49717 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:11:05 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902045eebd9d8c72-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:11:06 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902045f6b8ae4402-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:11:07 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902045fcc98742bb-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:58451 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49717 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49704 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49717
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49704
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49705
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.90
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.90
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.90
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.90
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.200.168.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.10
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.10
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.10
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.10
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 55.160.71.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.106
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.106
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.106
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.106
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.15.78.1
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.87
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.87
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.87
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.87
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 98.250.30.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe.5.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe, 00000006.00000002.1488877990.0000000000D0E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                Source: mssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2T
                Source: mssecsvc.exe, 00000006.00000002.1488877990.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/7
                Source: mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/S
                Source: mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/_
                Source: mssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/k
                Source: mssecsvc.exe, 00000006.00000002.1488877990.0000000000D0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ll
                Source: mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/m~
                Source: mssecsvc.exe, 00000006.00000002.1488877990.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/u
                Source: mssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com2
                Source: mssecsvc.exe, 00000008.00000002.2121783359.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                Source: mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comz~
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
                Source: Yara matchFile source: Yx3rRuVx3c.dll, type: SAMPLE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebe0a4.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ec2104.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23db8e8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23df948.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000000.1489242948.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1462495225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1489385533.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1477138066.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1497955176.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2123060566.0000000001EC2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1462063130.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1498211884.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2123406007.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3404, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2384, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6816, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: Yx3rRuVx3c.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: Yx3rRuVx3c.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23d08c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb3084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ebe0a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ebe0a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ec2104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ec2104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23db8e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23db8e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23df948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23df948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1462495225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.1489385533.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.1497327919.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.1487139439.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.1496586530.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2123060566.0000000001EC2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.1498211884.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2123406007.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
                Source: mssecsvc.exe.5.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: Yx3rRuVx3c.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: Yx3rRuVx3c.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: Yx3rRuVx3c.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23d08c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb3084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ee5128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1ec2104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.23df948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ee5128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1eb3084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ebe0a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ebe0a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ec2104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ec2104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23db8e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23db8e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23df948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23df948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1462495225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.1489385533.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.1497327919.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.1487139439.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.1496586530.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2123060566.0000000001EC2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.1498211884.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2123406007.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: tasksche.exe, 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.1497327919.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Yx3rRuVx3c.dll, mssecsvc.exe.5.dr, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1612:120:WilError_03
                Source: Yx3rRuVx3c.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Yx3rRuVx3c.dll,PlayGame
                Source: Yx3rRuVx3c.dllReversingLabs: Detection: 94%
                Source: Yx3rRuVx3c.dllVirustotal: Detection: 90%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Yx3rRuVx3c.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Yx3rRuVx3c.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: Yx3rRuVx3c.dllStatic file information: File size 5267459 > 1048576
                Source: Yx3rRuVx3c.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5040Thread sleep count: 94 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5040Thread sleep time: -188000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5372Thread sleep count: 127 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5372Thread sleep count: 40 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5040Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXp
                Source: mssecsvc.exe, 00000008.00000002.2122392658.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWE
                Source: mssecsvc.exe, 00000006.00000002.1488877990.0000000000D6D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1488877990.0000000000D0E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2122392658.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvc.exe, 00000006.00000002.1488877990.0000000000D6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWWqE5
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1Jump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media11
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591283 Sample: Yx3rRuVx3c.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 45 shed.dual-low.s-part-0017.t-0009.t-msedge.net 2->45 47 s-part-0017.t-0009.t-msedge.net 2->47 65 Tries to download HTTP data from a sinkholed server 2->65 67 Suricata IDS alerts for network traffic 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 6 other signatures 2->71 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        17 rundll32.exe 9->17         started        20 cmd.exe 1 9->20         started        22 conhost.exe 9->22         started        49 192.168.2.102 unknown unknown 11->49 51 192.168.2.103 unknown unknown 11->51 53 98 other IPs or domains 11->53 81 Connects to many different private IPs via SMB (likely to spread or exploit) 11->81 83 Connects to many different private IPs (likely to spread or exploit) 11->83 signatures6 process7 signatures8 24 mssecsvc.exe 7 15->24         started        63 Drops executables to the windows directory (C:\Windows) and starts them 17->63 28 mssecsvc.exe 7 17->28         started        30 rundll32.exe 1 20->30         started        process9 file10 37 C:\Windows\tasksche.exe, PE32 24->37 dropped 73 Antivirus detection for dropped file 24->73 75 Multi AV Scanner detection for dropped file 24->75 77 Machine Learning detection for dropped file 24->77 32 tasksche.exe 24->32         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->39 dropped 79 Drops executables to the windows directory (C:\Windows) and starts them 28->79 35 tasksche.exe 28->35         started        41 C:\Windows\mssecsvc.exe, PE32 30->41 dropped signatures11 process12 signatures13 55 Detected Wannacry Ransomware 32->55 57 Antivirus detection for dropped file 32->57 59 Multi AV Scanner detection for dropped file 32->59 61 Machine Learning detection for dropped file 32->61

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Yx3rRuVx3c.dll95%ReversingLabsWin32.Ransomware.WannaCry
                Yx3rRuVx3c.dll91%VirustotalBrowse
                Yx3rRuVx3c.dll100%AviraTR/Ransom.Gen
                Yx3rRuVx3c.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)90%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\mssecsvc.exe98%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe90%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com20%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comz~0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                104.16.167.228
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.5.drfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Smssecsvc.exe, 0000000B.00000002.1498619960.0000000000B82000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/llmssecsvc.exe, 00000006.00000002.1488877990.0000000000D0E000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comz~mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B38000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2Tmssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com2mssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/kmssecsvc.exe, 00000008.00000002.2122392658.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/m~mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B38000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/_mssecsvc.exe, 0000000B.00000002.1498619960.0000000000B82000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/7mssecsvc.exe, 00000006.00000002.1488877990.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/umssecsvc.exe, 00000006.00000002.1488877990.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2121783359.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        50.171.143.1
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        143.119.194.2
                                        unknownAustralia
                                        56307AC3-AS-APac3AustralianCentreforAdvancedComputingandfalse
                                        143.119.194.1
                                        unknownAustralia
                                        56307AC3-AS-APac3AustralianCentreforAdvancedComputingandfalse
                                        98.250.30.87
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        115.87.240.2
                                        unknownThailand
                                        17552TRUE-AS-APTrueInternetCoLtdTHfalse
                                        115.87.240.1
                                        unknownThailand
                                        17552TRUE-AS-APTrueInternetCoLtdTHfalse
                                        15.95.97.1
                                        unknownUnited States
                                        13979ATT-IPFRUSfalse
                                        141.229.167.1
                                        unknownunknown
                                        12701BARCAPLondonGBfalse
                                        89.242.253.1
                                        unknownUnited Kingdom
                                        13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBfalse
                                        128.201.179.149
                                        unknownBrazil
                                        262375DataInfoComercioeServicoLtdaBRfalse
                                        14.33.85.1
                                        unknownKorea Republic of
                                        4766KIXS-AS-KRKoreaTelecomKRfalse
                                        89.242.253.180
                                        unknownUnited Kingdom
                                        13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBfalse
                                        50.171.143.204
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        195.65.195.1
                                        unknownSwitzerland
                                        199642AS_ADUNO_2CHfalse
                                        55.200.168.90
                                        unknownUnited States
                                        1541DNIC-ASBLK-01534-01546USfalse
                                        26.34.166.2
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        26.34.166.1
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        42.63.214.2
                                        unknownChina
                                        4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                        163.241.66.124
                                        unknownUnited States
                                        668DNIC-AS-00668USfalse
                                        42.63.214.1
                                        unknownChina
                                        4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                        IP
                                        192.168.2.148
                                        192.168.2.149
                                        192.168.2.146
                                        192.168.2.147
                                        192.168.2.140
                                        192.168.2.141
                                        192.168.2.144
                                        192.168.2.145
                                        192.168.2.142
                                        192.168.2.143
                                        192.168.2.159
                                        192.168.2.157
                                        192.168.2.158
                                        192.168.2.151
                                        192.168.2.152
                                        192.168.2.150
                                        192.168.2.155
                                        192.168.2.156
                                        192.168.2.153
                                        192.168.2.154
                                        192.168.2.126
                                        192.168.2.247
                                        192.168.2.127
                                        192.168.2.248
                                        192.168.2.124
                                        192.168.2.245
                                        192.168.2.125
                                        192.168.2.246
                                        192.168.2.128
                                        192.168.2.249
                                        192.168.2.129
                                        192.168.2.240
                                        192.168.2.122
                                        192.168.2.243
                                        192.168.2.123
                                        192.168.2.244
                                        192.168.2.120
                                        192.168.2.241
                                        192.168.2.121
                                        192.168.2.242
                                        192.168.2.97
                                        192.168.2.137
                                        192.168.2.96
                                        192.168.2.138
                                        192.168.2.99
                                        192.168.2.135
                                        192.168.2.98
                                        192.168.2.136
                                        192.168.2.139
                                        192.168.2.250
                                        192.168.2.130
                                        192.168.2.251
                                        192.168.2.91
                                        192.168.2.90
                                        192.168.2.93
                                        192.168.2.133
                                        192.168.2.254
                                        192.168.2.92
                                        192.168.2.134
                                        192.168.2.95
                                        192.168.2.131
                                        192.168.2.252
                                        192.168.2.94
                                        192.168.2.132
                                        192.168.2.253
                                        192.168.2.104
                                        192.168.2.225
                                        192.168.2.105
                                        192.168.2.226
                                        192.168.2.102
                                        192.168.2.223
                                        192.168.2.103
                                        192.168.2.224
                                        192.168.2.108
                                        192.168.2.229
                                        192.168.2.109
                                        192.168.2.106
                                        192.168.2.227
                                        192.168.2.107
                                        192.168.2.228
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1591283
                                        Start date and time:2025-01-14 21:10:02 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 4m 45s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:16
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:Yx3rRuVx3c.dll
                                        renamed because original name is a hash value
                                        Original Sample Name:86af4a27e3caa42dbb67c93077d6c202.dll
                                        Detection:MAL
                                        Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                        EGA Information:
                                        • Successful, ratio: 66.7%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .dll
                                        • Stop behavior analysis, all processes terminated
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                        • Excluded IPs from analysis (whitelisted): 2.16.168.102, 2.17.190.73, 20.109.210.53, 13.107.246.45
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target tasksche.exe, PID 1888 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        15:11:05API Interceptor1x Sleep call for process: loaddll32.exe modified
                                        15:11:39API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        s-part-0017.t-0009.t-msedge.netsUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                        • 13.107.246.45
                                        logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 13.107.246.45
                                        DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.246.45
                                        DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.246.45
                                        EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 13.107.246.45
                                        Document_31055.pdfGet hashmaliciousUnknownBrowse
                                        • 13.107.246.45
                                        MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                                        • 13.107.246.45
                                        62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                                        • 13.107.246.45
                                        87.247.158.212.ps1Get hashmaliciousLummaCBrowse
                                        • 13.107.246.45
                                        ithDgrzsHr.exeGet hashmaliciousUnknownBrowse
                                        • 13.107.246.45
                                        www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.166.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.166.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.167.228
                                        LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        AC3-AS-APac3AustralianCentreforAdvancedComputingandarm.nn-20241120-0508.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 202.129.138.163
                                        sora.arm.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.11
                                        bin.x86_64.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.47
                                        la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                        • 122.252.150.28
                                        X309qRfJAl.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.25
                                        SecuriteInfo.com.Linux.Siggen.9999.11438.19201.elfGet hashmaliciousMiraiBrowse
                                        • 119.77.10.145
                                        sora.arm.elfGet hashmaliciousMiraiBrowse
                                        • 202.129.154.131
                                        GycOGRBrXW.elfGet hashmaliciousMiraiBrowse
                                        • 103.69.53.162
                                        mirai.spc.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.20
                                        xP1455Elxv.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 117.53.176.173
                                        AC3-AS-APac3AustralianCentreforAdvancedComputingandarm.nn-20241120-0508.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 202.129.138.163
                                        sora.arm.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.11
                                        bin.x86_64.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.47
                                        la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                        • 122.252.150.28
                                        X309qRfJAl.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.25
                                        SecuriteInfo.com.Linux.Siggen.9999.11438.19201.elfGet hashmaliciousMiraiBrowse
                                        • 119.77.10.145
                                        sora.arm.elfGet hashmaliciousMiraiBrowse
                                        • 202.129.154.131
                                        GycOGRBrXW.elfGet hashmaliciousMiraiBrowse
                                        • 103.69.53.162
                                        mirai.spc.elfGet hashmaliciousMiraiBrowse
                                        • 122.252.150.20
                                        xP1455Elxv.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 117.53.176.173
                                        COMCAST-7922US9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                        • 73.80.3.78
                                        6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                        • 28.125.169.1
                                        MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                        • 73.191.198.1
                                        mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                        • 26.20.34.202
                                        jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                        • 75.149.106.1
                                        Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                        • 68.43.54.12
                                        meth10.elfGet hashmaliciousMiraiBrowse
                                        • 50.189.178.1
                                        meth3.elfGet hashmaliciousMiraiBrowse
                                        • 69.246.125.237
                                        meth8.elfGet hashmaliciousMiraiBrowse
                                        • 50.136.199.8
                                        arm4.elfGet hashmaliciousUnknownBrowse
                                        • 73.242.202.214
                                        No context
                                        No context
                                        Process:C:\Windows\mssecsvc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3514368
                                        Entropy (8bit):7.746328445935644
                                        Encrypted:false
                                        SSDEEP:98304:QqPoBheaRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPpCxcxk3ZAEUadzR8yc4Hj
                                        MD5:B058C1426BA4967961EBB505C1E7ECC6
                                        SHA1:D28B760A3DCEED0D9C3D0E2138023D53992CF105
                                        SHA-256:B13FCD1C448FA3CB62B507FD26BCB8E8610EFD832C1F6A2EE7D43495DD31E4AA
                                        SHA-512:C21A12DB8D9A33087BB9CC29A0C6BC1E3E9517A292C1B58FC956225DF1E3C5679A1618F9AAECA2619DE5D19F2E6BA9175F22369A0EA15CCE129B36DB162F092C
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 90%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3723264
                                        Entropy (8bit):7.6988404936171415
                                        Encrypted:false
                                        SSDEEP:98304:XDqPoBheaRxcSUDk36SAEdhvxWa9P593R8yAVp2HI:XDqPpCxcxk3ZAEUadzR8yc4HI
                                        MD5:281BE5C102C0A2BB6061B3DE31E0EDCF
                                        SHA1:F1E3D7D88D7A0879BA01DED7929D087736C615B4
                                        SHA-256:FBE899A71FD548BD862A232C3DD48E3C07AF90563B4D72150E72852A565458D4
                                        SHA-512:4623731FF6EB600F52DA2D7B30DD5495759F363CCFA9320AE4691389939939E31063919A9681182E71B97232F0A3C63B5F69794A0365FF7114791C2418064C93
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 98%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\mssecsvc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3514368
                                        Entropy (8bit):7.746328445935644
                                        Encrypted:false
                                        SSDEEP:98304:QqPoBheaRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPpCxcxk3ZAEUadzR8yc4Hj
                                        MD5:B058C1426BA4967961EBB505C1E7ECC6
                                        SHA1:D28B760A3DCEED0D9C3D0E2138023D53992CF105
                                        SHA-256:B13FCD1C448FA3CB62B507FD26BCB8E8610EFD832C1F6A2EE7D43495DD31E4AA
                                        SHA-512:C21A12DB8D9A33087BB9CC29A0C6BC1E3E9517A292C1B58FC956225DF1E3C5679A1618F9AAECA2619DE5D19F2E6BA9175F22369A0EA15CCE129B36DB162F092C
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 90%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.071113900681511
                                        TrID:
                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                        • DOS Executable Generic (2002/1) 0.20%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:Yx3rRuVx3c.dll
                                        File size:5'267'459 bytes
                                        MD5:86af4a27e3caa42dbb67c93077d6c202
                                        SHA1:db4b121f4a8e7b489ebc7d8f25a80ae22a824cd5
                                        SHA256:ab56af6d0e81904633fc06450b8d48b503be33924736eee269fd0f4776d590cc
                                        SHA512:9132b1a657de2c9913ea8ed1891ac23041161dcea87d84a4c7f9faacd81e1fe7a07d792e818a4a9c2bdf3f68c8511fa1579f6a8d555018dce085394b72386166
                                        SSDEEP:98304:TDqPoBheaRxcSUDk36SAEdhvxWa9P593R8yAVp2H:TDqPpCxcxk3ZAEUadzR8yc4H
                                        TLSH:A9363394622CE2FCF0450DF44463896AF7B33C69A7BA4A1F97C0465B0D53B9BBBD0A41
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                        Icon Hash:7ae282899bbab082
                                        Entrypoint:0x100011e9
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x10000000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                        DLL Characteristics:
                                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                        Instruction
                                        push ebp
                                        mov ebp, esp
                                        push ebx
                                        mov ebx, dword ptr [ebp+08h]
                                        push esi
                                        mov esi, dword ptr [ebp+0Ch]
                                        push edi
                                        mov edi, dword ptr [ebp+10h]
                                        test esi, esi
                                        jne 00007FD504E9828Bh
                                        cmp dword ptr [10003140h], 00000000h
                                        jmp 00007FD504E982A8h
                                        cmp esi, 01h
                                        je 00007FD504E98287h
                                        cmp esi, 02h
                                        jne 00007FD504E982A4h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007FD504E9828Bh
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        test eax, eax
                                        je 00007FD504E9828Eh
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007FD504E9819Ah
                                        test eax, eax
                                        jne 00007FD504E98286h
                                        xor eax, eax
                                        jmp 00007FD504E982D0h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007FD504E9804Ch
                                        cmp esi, 01h
                                        mov dword ptr [ebp+0Ch], eax
                                        jne 00007FD504E9828Eh
                                        test eax, eax
                                        jne 00007FD504E982B9h
                                        push edi
                                        push eax
                                        push ebx
                                        call 00007FD504E98176h
                                        test esi, esi
                                        je 00007FD504E98287h
                                        cmp esi, 03h
                                        jne 00007FD504E982A8h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007FD504E98165h
                                        test eax, eax
                                        jne 00007FD504E98285h
                                        and dword ptr [ebp+0Ch], eax
                                        cmp dword ptr [ebp+0Ch], 00000000h
                                        je 00007FD504E98293h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007FD504E9828Ah
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        mov dword ptr [ebp+0Ch], eax
                                        mov eax, dword ptr [ebp+0Ch]
                                        pop edi
                                        pop esi
                                        pop ebx
                                        pop ebp
                                        retn 000Ch
                                        jmp dword ptr [10002028h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        Programming Language:
                                        • [ C ] VS98 (6.0) build 8168
                                        • [C++] VS98 (6.0) build 8168
                                        • [RES] VS98 (6.0) cvtres build 1720
                                        • [LNK] VS98 (6.0) imp/exp build 8168
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x40000x5000600x501000bf443ba7b56e4b6d3162f15226f135f2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        W0x40600x500000dataEnglishUnited States0.7951688766479492
                                        DLLImport
                                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                        NameOrdinalAddress
                                        PlayGame10x10001114
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-14T21:11:04.945759+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8584511.1.1.153UDP
                                        2025-01-14T21:11:05.467305+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849704104.16.167.22880TCP
                                        2025-01-14T21:11:05.467305+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849704104.16.167.22880TCP
                                        2025-01-14T21:11:05.467305+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849704104.16.167.22880TCP
                                        2025-01-14T21:11:05.467305+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849704104.16.167.22880TCP
                                        2025-01-14T21:11:05.467305+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849704104.16.167.22880TCP
                                        2025-01-14T21:11:05.467399+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849704TCP
                                        2025-01-14T21:11:06.745291+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849705104.16.167.22880TCP
                                        2025-01-14T21:11:06.745291+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849705104.16.167.22880TCP
                                        2025-01-14T21:11:06.745291+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849705104.16.167.22880TCP
                                        2025-01-14T21:11:06.745291+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849705104.16.167.22880TCP
                                        2025-01-14T21:11:06.745291+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849705104.16.167.22880TCP
                                        2025-01-14T21:11:06.745376+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849705TCP
                                        2025-01-14T21:11:07.717150+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849717104.16.167.22880TCP
                                        2025-01-14T21:11:07.717150+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849717104.16.167.22880TCP
                                        2025-01-14T21:11:07.717150+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849717104.16.167.22880TCP
                                        2025-01-14T21:11:07.717150+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849717104.16.167.22880TCP
                                        2025-01-14T21:11:07.717150+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849717104.16.167.22880TCP
                                        2025-01-14T21:11:07.717309+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849717TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 21:10:58.700021982 CET49673443192.168.2.823.206.229.226
                                        Jan 14, 2025 21:10:59.028048992 CET49672443192.168.2.823.206.229.226
                                        Jan 14, 2025 21:11:03.637437105 CET49676443192.168.2.852.182.143.211
                                        Jan 14, 2025 21:11:04.965177059 CET4970480192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:04.970066071 CET8049704104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:04.970168114 CET4970480192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:04.970386982 CET4970480192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:04.975192070 CET8049704104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:05.467102051 CET8049704104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:05.467304945 CET4970480192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:05.467398882 CET8049704104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:05.467482090 CET4970480192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:05.467520952 CET4970480192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:05.472395897 CET8049704104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:06.255825996 CET4970580192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:06.260759115 CET8049705104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:06.260840893 CET4970580192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:06.260993004 CET4970580192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:06.265954018 CET8049705104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:06.278002024 CET4967780192.168.2.8192.229.211.108
                                        Jan 14, 2025 21:11:06.745199919 CET8049705104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:06.745290995 CET4970580192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:06.745376110 CET8049705104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:06.745433092 CET4970580192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:06.746123075 CET4970580192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:06.750282049 CET8049705104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:06.812273026 CET49706445192.168.2.855.200.168.90
                                        Jan 14, 2025 21:11:06.817354918 CET4454970655.200.168.90192.168.2.8
                                        Jan 14, 2025 21:11:06.817487955 CET49706445192.168.2.855.200.168.90
                                        Jan 14, 2025 21:11:06.829848051 CET49706445192.168.2.855.200.168.90
                                        Jan 14, 2025 21:11:06.830562115 CET49707445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.834805012 CET4454970655.200.168.90192.168.2.8
                                        Jan 14, 2025 21:11:06.834866047 CET49706445192.168.2.855.200.168.90
                                        Jan 14, 2025 21:11:06.835445881 CET4454970755.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:06.835524082 CET49707445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.835558891 CET49707445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.839611053 CET49709445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.840620041 CET4454970755.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:06.840691090 CET49707445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.844506025 CET4454970955.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:06.844583988 CET49709445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.844662905 CET49709445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:06.849518061 CET4454970955.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:07.243047953 CET4971780192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:07.248155117 CET8049717104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:07.248249054 CET4971780192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:07.248406887 CET4971780192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:07.253256083 CET8049717104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:07.717003107 CET8049717104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:07.717149973 CET4971780192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:07.717284918 CET4971780192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:07.717308998 CET8049717104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:07.720338106 CET4971780192.168.2.8104.16.167.228
                                        Jan 14, 2025 21:11:07.722176075 CET8049717104.16.167.228192.168.2.8
                                        Jan 14, 2025 21:11:08.309251070 CET49673443192.168.2.823.206.229.226
                                        Jan 14, 2025 21:11:08.637361050 CET49672443192.168.2.823.206.229.226
                                        Jan 14, 2025 21:11:08.829233885 CET49732445192.168.2.855.160.71.10
                                        Jan 14, 2025 21:11:08.834465027 CET4454973255.160.71.10192.168.2.8
                                        Jan 14, 2025 21:11:08.834566116 CET49732445192.168.2.855.160.71.10
                                        Jan 14, 2025 21:11:08.834754944 CET49732445192.168.2.855.160.71.10
                                        Jan 14, 2025 21:11:08.835068941 CET49733445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.839665890 CET4454973255.160.71.10192.168.2.8
                                        Jan 14, 2025 21:11:08.839731932 CET49732445192.168.2.855.160.71.10
                                        Jan 14, 2025 21:11:08.839984894 CET4454973355.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:08.840056896 CET49733445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.840245962 CET49733445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.845081091 CET4454973355.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:08.845604897 CET49733445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.878362894 CET49734445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.883514881 CET4454973455.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:08.883591890 CET49734445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.883774042 CET49734445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:08.888586998 CET4454973455.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:10.270792961 CET4434970323.206.229.226192.168.2.8
                                        Jan 14, 2025 21:11:10.270906925 CET49703443192.168.2.823.206.229.226
                                        Jan 14, 2025 21:11:10.810720921 CET49757445192.168.2.8141.15.78.106
                                        Jan 14, 2025 21:11:10.816061020 CET44549757141.15.78.106192.168.2.8
                                        Jan 14, 2025 21:11:10.816159010 CET49757445192.168.2.8141.15.78.106
                                        Jan 14, 2025 21:11:10.816184998 CET49757445192.168.2.8141.15.78.106
                                        Jan 14, 2025 21:11:10.816436052 CET49758445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.821366072 CET44549757141.15.78.106192.168.2.8
                                        Jan 14, 2025 21:11:10.821400881 CET44549758141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:10.821433067 CET49757445192.168.2.8141.15.78.106
                                        Jan 14, 2025 21:11:10.821480989 CET49758445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.821522951 CET49758445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.822645903 CET49759445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.826483011 CET44549758141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:10.826565027 CET49758445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.827538013 CET44549759141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:10.827609062 CET49759445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.827660084 CET49759445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:10.832511902 CET44549759141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:12.826014042 CET49780445192.168.2.898.250.30.87
                                        Jan 14, 2025 21:11:12.831170082 CET4454978098.250.30.87192.168.2.8
                                        Jan 14, 2025 21:11:12.831264973 CET49780445192.168.2.898.250.30.87
                                        Jan 14, 2025 21:11:12.831283092 CET49780445192.168.2.898.250.30.87
                                        Jan 14, 2025 21:11:12.831466913 CET49781445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.836311102 CET4454978098.250.30.87192.168.2.8
                                        Jan 14, 2025 21:11:12.836370945 CET4454978198.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:12.836436987 CET4454978098.250.30.87192.168.2.8
                                        Jan 14, 2025 21:11:12.836600065 CET49780445192.168.2.898.250.30.87
                                        Jan 14, 2025 21:11:12.836623907 CET49781445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.836673021 CET49781445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.837677956 CET49782445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.841692924 CET4454978198.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:12.841762066 CET49781445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.842533112 CET4454978298.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:12.842597961 CET49782445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.842629910 CET49782445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:12.847454071 CET4454978298.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:14.841617107 CET49804445192.168.2.8160.49.44.178
                                        Jan 14, 2025 21:11:14.846832037 CET44549804160.49.44.178192.168.2.8
                                        Jan 14, 2025 21:11:14.846932888 CET49804445192.168.2.8160.49.44.178
                                        Jan 14, 2025 21:11:14.846967936 CET49804445192.168.2.8160.49.44.178
                                        Jan 14, 2025 21:11:14.847165108 CET49805445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.852058887 CET44549804160.49.44.178192.168.2.8
                                        Jan 14, 2025 21:11:14.852093935 CET44549805160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:14.852118969 CET49804445192.168.2.8160.49.44.178
                                        Jan 14, 2025 21:11:14.852170944 CET49805445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.852206945 CET49805445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.853275061 CET49806445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.857206106 CET44549805160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:14.857285023 CET49805445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.858139038 CET44549806160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:14.858215094 CET49806445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.858273983 CET49806445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:14.863048077 CET44549806160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:16.880948067 CET49828445192.168.2.842.63.214.212
                                        Jan 14, 2025 21:11:16.886188984 CET4454982842.63.214.212192.168.2.8
                                        Jan 14, 2025 21:11:16.886315107 CET49828445192.168.2.842.63.214.212
                                        Jan 14, 2025 21:11:16.887870073 CET49828445192.168.2.842.63.214.212
                                        Jan 14, 2025 21:11:16.888087988 CET49829445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.892761946 CET4454982842.63.214.212192.168.2.8
                                        Jan 14, 2025 21:11:16.892858982 CET49828445192.168.2.842.63.214.212
                                        Jan 14, 2025 21:11:16.893028021 CET4454982942.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:16.893088102 CET49829445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.895407915 CET49829445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.899142981 CET49831445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.900408983 CET4454982942.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:16.900441885 CET4454982942.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:16.900495052 CET49829445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.904102087 CET4454983142.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:16.904171944 CET49831445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.904213905 CET49831445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:16.909142017 CET4454983142.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:18.872204065 CET49854445192.168.2.826.34.166.232
                                        Jan 14, 2025 21:11:18.877523899 CET4454985426.34.166.232192.168.2.8
                                        Jan 14, 2025 21:11:18.879884005 CET49855445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.880382061 CET49854445192.168.2.826.34.166.232
                                        Jan 14, 2025 21:11:18.880382061 CET49854445192.168.2.826.34.166.232
                                        Jan 14, 2025 21:11:18.884869099 CET4454985526.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:18.885437965 CET49855445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.885437965 CET49855445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.885575056 CET4454985426.34.166.232192.168.2.8
                                        Jan 14, 2025 21:11:18.885689020 CET49854445192.168.2.826.34.166.232
                                        Jan 14, 2025 21:11:18.885742903 CET49856445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.890434027 CET4454985526.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:18.890496969 CET49855445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.890567064 CET4454985626.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:18.890621901 CET49856445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.890649080 CET49856445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:18.895529985 CET4454985626.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:20.888490915 CET49881445192.168.2.899.242.202.155
                                        Jan 14, 2025 21:11:20.894079924 CET4454988199.242.202.155192.168.2.8
                                        Jan 14, 2025 21:11:20.894169092 CET49881445192.168.2.899.242.202.155
                                        Jan 14, 2025 21:11:20.894249916 CET49881445192.168.2.899.242.202.155
                                        Jan 14, 2025 21:11:20.894393921 CET49882445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.899857044 CET4454988299.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:20.899904966 CET4454988199.242.202.155192.168.2.8
                                        Jan 14, 2025 21:11:20.899941921 CET49882445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.899976969 CET49881445192.168.2.899.242.202.155
                                        Jan 14, 2025 21:11:20.900038958 CET49882445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.900471926 CET49883445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.905750990 CET4454988299.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:20.905807018 CET4454988399.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:20.905816078 CET49882445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.905879021 CET49883445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.905922890 CET49883445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:20.910810947 CET4454988399.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:22.903491020 CET49906445192.168.2.8143.119.194.145
                                        Jan 14, 2025 21:11:22.908476114 CET44549906143.119.194.145192.168.2.8
                                        Jan 14, 2025 21:11:22.908597946 CET49906445192.168.2.8143.119.194.145
                                        Jan 14, 2025 21:11:22.908720970 CET49906445192.168.2.8143.119.194.145
                                        Jan 14, 2025 21:11:22.908926010 CET49907445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.913727045 CET44549906143.119.194.145192.168.2.8
                                        Jan 14, 2025 21:11:22.913786888 CET44549907143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:22.913786888 CET49906445192.168.2.8143.119.194.145
                                        Jan 14, 2025 21:11:22.913867950 CET49907445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.913959980 CET49907445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.914307117 CET49908445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.918912888 CET44549907143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:22.918982983 CET49907445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.919222116 CET44549908143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:22.919298887 CET49908445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.919348955 CET49908445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:22.924366951 CET44549908143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:24.919436932 CET49930445192.168.2.8134.75.40.9
                                        Jan 14, 2025 21:11:24.924333096 CET44549930134.75.40.9192.168.2.8
                                        Jan 14, 2025 21:11:24.924422026 CET49930445192.168.2.8134.75.40.9
                                        Jan 14, 2025 21:11:24.924498081 CET49930445192.168.2.8134.75.40.9
                                        Jan 14, 2025 21:11:24.924660921 CET49931445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.929527998 CET44549931134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:24.929559946 CET44549930134.75.40.9192.168.2.8
                                        Jan 14, 2025 21:11:24.929668903 CET49931445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.929704905 CET49930445192.168.2.8134.75.40.9
                                        Jan 14, 2025 21:11:24.929770947 CET49931445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.930124998 CET49932445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.934981108 CET44549932134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:24.935054064 CET49932445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.935094118 CET49932445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.935511112 CET44549931134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:24.935570002 CET49931445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:24.939889908 CET44549932134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:26.934999943 CET49955445192.168.2.8191.114.167.61
                                        Jan 14, 2025 21:11:26.939960003 CET44549955191.114.167.61192.168.2.8
                                        Jan 14, 2025 21:11:26.940072060 CET49955445192.168.2.8191.114.167.61
                                        Jan 14, 2025 21:11:26.940135002 CET49955445192.168.2.8191.114.167.61
                                        Jan 14, 2025 21:11:26.940416098 CET49956445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.945116043 CET44549955191.114.167.61192.168.2.8
                                        Jan 14, 2025 21:11:26.945200920 CET49955445192.168.2.8191.114.167.61
                                        Jan 14, 2025 21:11:26.945251942 CET44549956191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:26.945319891 CET49956445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.945502043 CET49956445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.945899010 CET49957445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.950391054 CET44549956191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:26.950463057 CET49956445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.950676918 CET44549957191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:26.950737953 CET49957445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.950793028 CET49957445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:26.955558062 CET44549957191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:28.215073109 CET4454970955.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:28.215246916 CET49709445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:28.215374947 CET49709445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:28.220237970 CET4454970955.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:28.950849056 CET49978445192.168.2.840.118.193.32
                                        Jan 14, 2025 21:11:28.955632925 CET4454997840.118.193.32192.168.2.8
                                        Jan 14, 2025 21:11:28.955718994 CET49978445192.168.2.840.118.193.32
                                        Jan 14, 2025 21:11:28.955744028 CET49978445192.168.2.840.118.193.32
                                        Jan 14, 2025 21:11:28.955835104 CET49980445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.960622072 CET4454998040.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:28.960674047 CET49980445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.960701942 CET49980445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.960803032 CET4454997840.118.193.32192.168.2.8
                                        Jan 14, 2025 21:11:28.960850000 CET49978445192.168.2.840.118.193.32
                                        Jan 14, 2025 21:11:28.961015940 CET49981445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.965666056 CET4454998040.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:28.965723038 CET49980445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.965801001 CET4454998140.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:28.965853930 CET49981445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.965900898 CET49981445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:28.970664978 CET4454998140.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:30.277689934 CET4454973455.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:30.277838945 CET49734445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:30.277947903 CET49734445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:30.278143883 CET49734445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:30.282732964 CET4454973455.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:30.282883883 CET4454973455.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:31.088094950 CET50003445192.168.2.8141.52.193.217
                                        Jan 14, 2025 21:11:31.093095064 CET44550003141.52.193.217192.168.2.8
                                        Jan 14, 2025 21:11:31.093185902 CET50003445192.168.2.8141.52.193.217
                                        Jan 14, 2025 21:11:31.093301058 CET50003445192.168.2.8141.52.193.217
                                        Jan 14, 2025 21:11:31.093549967 CET50004445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.098170042 CET44550003141.52.193.217192.168.2.8
                                        Jan 14, 2025 21:11:31.098247051 CET50003445192.168.2.8141.52.193.217
                                        Jan 14, 2025 21:11:31.098303080 CET44550004141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:31.098372936 CET50004445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.103812933 CET50004445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.108645916 CET44550004141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:31.108733892 CET50004445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.123244047 CET50006445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.128145933 CET44550006141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:31.128251076 CET50006445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.128266096 CET50006445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:31.133071899 CET44550006141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:31.254714012 CET50008445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:31.259790897 CET4455000855.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:31.259880066 CET50008445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:31.267018080 CET50008445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:31.271873951 CET4455000855.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:32.184525967 CET44549759141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:32.184855938 CET49759445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:32.184976101 CET49759445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:32.185065031 CET49759445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:32.189867020 CET44549759141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:32.189891100 CET44549759141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:33.028474092 CET50009445192.168.2.8193.179.167.168
                                        Jan 14, 2025 21:11:33.033353090 CET44550009193.179.167.168192.168.2.8
                                        Jan 14, 2025 21:11:33.033430099 CET50009445192.168.2.8193.179.167.168
                                        Jan 14, 2025 21:11:33.033514023 CET50009445192.168.2.8193.179.167.168
                                        Jan 14, 2025 21:11:33.033663988 CET50010445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.038466930 CET44550009193.179.167.168192.168.2.8
                                        Jan 14, 2025 21:11:33.038485050 CET44550010193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:33.038558006 CET50009445192.168.2.8193.179.167.168
                                        Jan 14, 2025 21:11:33.038589001 CET50010445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.038661003 CET50010445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.038916111 CET50011445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.043546915 CET44550010193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:33.043751955 CET44550011193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:33.043796062 CET50010445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.043821096 CET50011445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.043860912 CET50011445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:33.048583031 CET44550011193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:33.294228077 CET50012445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:33.299303055 CET4455001255.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:33.299459934 CET50012445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:33.299509048 CET50012445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:33.304307938 CET4455001255.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:34.255774021 CET4454978298.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:34.255846977 CET49782445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:34.255913973 CET49782445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:34.255991936 CET49782445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:34.260864973 CET4454978298.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:34.260937929 CET4454978298.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:35.044401884 CET50013445192.168.2.8142.73.125.171
                                        Jan 14, 2025 21:11:35.049170971 CET44550013142.73.125.171192.168.2.8
                                        Jan 14, 2025 21:11:35.049298048 CET50013445192.168.2.8142.73.125.171
                                        Jan 14, 2025 21:11:35.049405098 CET50013445192.168.2.8142.73.125.171
                                        Jan 14, 2025 21:11:35.049673080 CET50014445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.054249048 CET44550013142.73.125.171192.168.2.8
                                        Jan 14, 2025 21:11:35.054327965 CET50013445192.168.2.8142.73.125.171
                                        Jan 14, 2025 21:11:35.054441929 CET44550014142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:35.054502964 CET50014445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.054533958 CET50014445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.054907084 CET50015445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.059612036 CET44550014142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:35.059658051 CET44550015142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:35.059664011 CET50014445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.059740067 CET50015445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.059819937 CET50015445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:35.064527035 CET44550015142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:35.200469017 CET50016445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:35.205539942 CET44550016141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:35.205694914 CET50016445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:35.205729008 CET50016445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:35.210649967 CET44550016141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:36.253273010 CET44549806160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:36.253360033 CET49806445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:36.253423929 CET49806445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:36.253519058 CET49806445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:36.258294106 CET44549806160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:36.258382082 CET44549806160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:37.060081005 CET50017445192.168.2.8141.229.167.227
                                        Jan 14, 2025 21:11:37.064950943 CET44550017141.229.167.227192.168.2.8
                                        Jan 14, 2025 21:11:37.065100908 CET50017445192.168.2.8141.229.167.227
                                        Jan 14, 2025 21:11:37.065100908 CET50017445192.168.2.8141.229.167.227
                                        Jan 14, 2025 21:11:37.065210104 CET50018445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.070046902 CET44550018141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:37.070125103 CET50018445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.070190907 CET44550017141.229.167.227192.168.2.8
                                        Jan 14, 2025 21:11:37.070260048 CET50017445192.168.2.8141.229.167.227
                                        Jan 14, 2025 21:11:37.070631981 CET50019445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.071337938 CET50018445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.075413942 CET44550019141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:37.075470924 CET50019445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.075503111 CET50019445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.076237917 CET44550018141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:37.076322079 CET50018445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:37.080310106 CET44550019141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:37.263137102 CET50020445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:37.267982006 CET4455002098.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:37.268091917 CET50020445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:37.268193960 CET50020445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:37.272953987 CET4455002098.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:38.283179045 CET4454983142.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:38.283334017 CET49831445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:38.283402920 CET49831445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:38.283489943 CET49831445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:38.288261890 CET4454983142.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:38.288275957 CET4454983142.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:39.075501919 CET50021445192.168.2.8177.167.133.10
                                        Jan 14, 2025 21:11:39.080643892 CET44550021177.167.133.10192.168.2.8
                                        Jan 14, 2025 21:11:39.080759048 CET50021445192.168.2.8177.167.133.10
                                        Jan 14, 2025 21:11:39.080780983 CET50021445192.168.2.8177.167.133.10
                                        Jan 14, 2025 21:11:39.080884933 CET50022445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.085722923 CET44550022177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:11:39.085782051 CET50022445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.085853100 CET50022445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.086055994 CET44550021177.167.133.10192.168.2.8
                                        Jan 14, 2025 21:11:39.086112022 CET50021445192.168.2.8177.167.133.10
                                        Jan 14, 2025 21:11:39.086436033 CET50023445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.090888023 CET44550022177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:11:39.090941906 CET50022445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.091275930 CET44550023177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:11:39.091337919 CET50023445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.091396093 CET50023445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:11:39.096143007 CET44550023177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:11:39.263344049 CET50024445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:39.268224955 CET44550024160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:39.268318892 CET50024445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:39.275430918 CET50024445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:11:39.280551910 CET44550024160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:11:40.252243996 CET4454985626.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:40.252346992 CET49856445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:40.252424002 CET49856445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:40.252495050 CET49856445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:40.257232904 CET4454985626.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:40.257318974 CET4454985626.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:41.091170073 CET50025445192.168.2.8162.239.127.197
                                        Jan 14, 2025 21:11:41.096075058 CET44550025162.239.127.197192.168.2.8
                                        Jan 14, 2025 21:11:41.096151114 CET50025445192.168.2.8162.239.127.197
                                        Jan 14, 2025 21:11:41.096183062 CET50025445192.168.2.8162.239.127.197
                                        Jan 14, 2025 21:11:41.096348047 CET50026445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.101243019 CET44550026162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:11:41.101308107 CET50026445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.101337910 CET50026445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.101377964 CET44550025162.239.127.197192.168.2.8
                                        Jan 14, 2025 21:11:41.101432085 CET50025445192.168.2.8162.239.127.197
                                        Jan 14, 2025 21:11:41.101663113 CET50027445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.106570959 CET44550026162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:11:41.106635094 CET50026445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.106719971 CET44550027162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:11:41.106792927 CET50027445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.106842995 CET50027445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:11:41.112164021 CET44550027162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:11:41.294436932 CET50028445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:41.299390078 CET4455002842.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:41.299500942 CET50028445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:41.299567938 CET50028445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:11:41.304410934 CET4455002842.63.214.1192.168.2.8
                                        Jan 14, 2025 21:11:42.277879000 CET4454988399.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:42.277975082 CET49883445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:42.278024912 CET49883445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:42.278254986 CET49883445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:42.282927990 CET4454988399.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:42.283107996 CET4454988399.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:42.966258049 CET50029445192.168.2.883.213.152.40
                                        Jan 14, 2025 21:11:42.971112013 CET4455002983.213.152.40192.168.2.8
                                        Jan 14, 2025 21:11:42.971246958 CET50029445192.168.2.883.213.152.40
                                        Jan 14, 2025 21:11:42.971370935 CET50029445192.168.2.883.213.152.40
                                        Jan 14, 2025 21:11:42.971637011 CET50030445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.976262093 CET4455002983.213.152.40192.168.2.8
                                        Jan 14, 2025 21:11:42.976396084 CET4455003083.213.152.1192.168.2.8
                                        Jan 14, 2025 21:11:42.976465940 CET50030445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.976543903 CET50030445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.976561069 CET4455002983.213.152.40192.168.2.8
                                        Jan 14, 2025 21:11:42.976605892 CET50029445192.168.2.883.213.152.40
                                        Jan 14, 2025 21:11:42.976979017 CET50031445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.981466055 CET4455003083.213.152.1192.168.2.8
                                        Jan 14, 2025 21:11:42.981513023 CET50030445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.981758118 CET4455003183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:11:42.981816053 CET50031445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.981847048 CET50031445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:11:42.986607075 CET4455003183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:11:43.262806892 CET50032445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:43.268009901 CET4455003226.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:43.268137932 CET50032445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:43.268188953 CET50032445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:11:43.273014069 CET4455003226.34.166.1192.168.2.8
                                        Jan 14, 2025 21:11:44.278410912 CET44549908143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:44.278548002 CET49908445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:44.278614998 CET49908445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:44.278672934 CET49908445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:44.283451080 CET44549908143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:44.283464909 CET44549908143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:44.716258049 CET50033445192.168.2.8115.87.240.160
                                        Jan 14, 2025 21:11:44.721667051 CET44550033115.87.240.160192.168.2.8
                                        Jan 14, 2025 21:11:44.721761942 CET50033445192.168.2.8115.87.240.160
                                        Jan 14, 2025 21:11:44.721807003 CET50033445192.168.2.8115.87.240.160
                                        Jan 14, 2025 21:11:44.721971035 CET50034445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.726772070 CET44550033115.87.240.160192.168.2.8
                                        Jan 14, 2025 21:11:44.726823092 CET50033445192.168.2.8115.87.240.160
                                        Jan 14, 2025 21:11:44.729640007 CET44550034115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:44.729720116 CET50034445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.729773045 CET50034445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.730057001 CET50035445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.734761000 CET44550034115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:44.734813929 CET50034445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.737646103 CET44550035115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:44.737715006 CET50035445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.737751007 CET50035445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:44.742551088 CET44550035115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:45.294086933 CET50036445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:45.299002886 CET4455003699.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:45.299130917 CET50036445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:45.299168110 CET50036445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:11:45.303986073 CET4455003699.242.202.1192.168.2.8
                                        Jan 14, 2025 21:11:46.297244072 CET44549932134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:46.297374964 CET49932445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:46.300071955 CET49932445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:46.300126076 CET49932445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:46.304924965 CET44549932134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:46.305002928 CET44549932134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:46.369993925 CET50037445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.374840975 CET44550037183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:11:46.374908924 CET50037445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.378176928 CET50037445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.378329039 CET50038445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.383147001 CET44550037183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:11:46.383162975 CET44550038183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:11:46.383261919 CET50037445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.383263111 CET50038445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.386414051 CET50038445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.390537977 CET50039445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.391261101 CET44550038183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:11:46.391324043 CET50038445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.395374060 CET44550039183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:11:46.395488977 CET50039445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.398736000 CET50039445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:11:46.403561115 CET44550039183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:11:47.049858093 CET44550035115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:47.049915075 CET50035445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:47.049958944 CET50035445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:47.050046921 CET50035445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:47.054759979 CET44550035115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:47.054893970 CET44550035115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:47.293910980 CET50040445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:47.298754930 CET44550040143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:47.298830032 CET50040445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:47.298868895 CET50040445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:11:47.303826094 CET44550040143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:11:47.888389111 CET50041445192.168.2.8199.166.218.131
                                        Jan 14, 2025 21:11:47.893318892 CET44550041199.166.218.131192.168.2.8
                                        Jan 14, 2025 21:11:47.893389940 CET50041445192.168.2.8199.166.218.131
                                        Jan 14, 2025 21:11:47.893620968 CET50041445192.168.2.8199.166.218.131
                                        Jan 14, 2025 21:11:47.893646955 CET50042445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.898483038 CET44550042199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:11:47.898561954 CET50042445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.898629904 CET50042445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.898993015 CET50043445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.900264978 CET44550041199.166.218.131192.168.2.8
                                        Jan 14, 2025 21:11:47.903836012 CET44550043199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:11:47.903938055 CET50043445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.903954983 CET50043445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.904266119 CET44550042199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:11:47.905888081 CET44550041199.166.218.131192.168.2.8
                                        Jan 14, 2025 21:11:47.905937910 CET50041445192.168.2.8199.166.218.131
                                        Jan 14, 2025 21:11:47.906182051 CET44550042199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:11:47.906235933 CET50042445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:11:47.908816099 CET44550043199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:11:48.309062004 CET44549957191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:48.309197903 CET49957445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:48.309341908 CET49957445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:48.309437990 CET49957445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:48.314143896 CET44549957191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:48.314168930 CET44549957191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:49.309789896 CET50044445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:49.314563036 CET44550044134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:49.314634085 CET50044445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:49.314675093 CET50044445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:11:49.314913988 CET50045445192.168.2.850.171.143.204
                                        Jan 14, 2025 21:11:49.319439888 CET44550044134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:11:49.319674969 CET4455004550.171.143.204192.168.2.8
                                        Jan 14, 2025 21:11:49.319746017 CET50045445192.168.2.850.171.143.204
                                        Jan 14, 2025 21:11:49.319895029 CET50045445192.168.2.850.171.143.204
                                        Jan 14, 2025 21:11:49.320266008 CET50046445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.324774981 CET4455004550.171.143.204192.168.2.8
                                        Jan 14, 2025 21:11:49.324851990 CET50045445192.168.2.850.171.143.204
                                        Jan 14, 2025 21:11:49.325145006 CET4455004650.171.143.1192.168.2.8
                                        Jan 14, 2025 21:11:49.325207949 CET50046445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.325793982 CET50046445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.330662966 CET4455004650.171.143.1192.168.2.8
                                        Jan 14, 2025 21:11:49.330749035 CET50046445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.335135937 CET50047445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.339905024 CET4455004750.171.143.1192.168.2.8
                                        Jan 14, 2025 21:11:49.339983940 CET50047445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.340051889 CET50047445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:11:49.344876051 CET4455004750.171.143.1192.168.2.8
                                        Jan 14, 2025 21:11:50.059653044 CET50048445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:50.064718962 CET44550048115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:50.064851046 CET50048445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:50.064894915 CET50048445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:50.069698095 CET44550048115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:50.361783028 CET4454998140.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:50.361965895 CET49981445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:50.362040997 CET49981445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:50.362092018 CET49981445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:50.367196083 CET4454998140.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:50.367228031 CET4454998140.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:50.647130966 CET50049445192.168.2.815.95.97.162
                                        Jan 14, 2025 21:11:50.652200937 CET4455004915.95.97.162192.168.2.8
                                        Jan 14, 2025 21:11:50.653733015 CET50049445192.168.2.815.95.97.162
                                        Jan 14, 2025 21:11:50.654102087 CET50050445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.655345917 CET50049445192.168.2.815.95.97.162
                                        Jan 14, 2025 21:11:50.658931017 CET4455005015.95.97.1192.168.2.8
                                        Jan 14, 2025 21:11:50.660279036 CET4455004915.95.97.162192.168.2.8
                                        Jan 14, 2025 21:11:50.660362005 CET50050445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.660393000 CET4455004915.95.97.162192.168.2.8
                                        Jan 14, 2025 21:11:50.660475969 CET50050445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.660986900 CET50051445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.661619902 CET50049445192.168.2.815.95.97.162
                                        Jan 14, 2025 21:11:50.665474892 CET4455005015.95.97.1192.168.2.8
                                        Jan 14, 2025 21:11:50.665688992 CET50050445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.665765047 CET4455005115.95.97.1192.168.2.8
                                        Jan 14, 2025 21:11:50.669871092 CET50051445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.669871092 CET50051445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:11:50.674773932 CET4455005115.95.97.1192.168.2.8
                                        Jan 14, 2025 21:11:51.326864004 CET50052445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:51.332644939 CET44550052191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:51.332756042 CET50052445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:51.332801104 CET50052445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:11:51.338668108 CET44550052191.114.167.1192.168.2.8
                                        Jan 14, 2025 21:11:51.903145075 CET50053445192.168.2.8156.249.22.231
                                        Jan 14, 2025 21:11:51.908037901 CET44550053156.249.22.231192.168.2.8
                                        Jan 14, 2025 21:11:51.908144951 CET50053445192.168.2.8156.249.22.231
                                        Jan 14, 2025 21:11:51.908211946 CET50053445192.168.2.8156.249.22.231
                                        Jan 14, 2025 21:11:51.912655115 CET50054445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.913378954 CET44550053156.249.22.231192.168.2.8
                                        Jan 14, 2025 21:11:51.913455009 CET50053445192.168.2.8156.249.22.231
                                        Jan 14, 2025 21:11:51.917531013 CET44550054156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:51.917613983 CET50054445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.922234058 CET50054445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.927104950 CET44550054156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:51.927201033 CET50054445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.936302900 CET50055445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.941253901 CET44550055156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:51.941369057 CET50055445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.945363998 CET50055445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:51.950290918 CET44550055156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:52.229756117 CET44550048115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:52.229852915 CET50048445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:52.230945110 CET50048445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:52.231051922 CET50048445192.168.2.8115.87.240.1
                                        Jan 14, 2025 21:11:52.235826969 CET44550048115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:52.235902071 CET44550048115.87.240.1192.168.2.8
                                        Jan 14, 2025 21:11:52.294647932 CET50056445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.299683094 CET44550056115.87.240.2192.168.2.8
                                        Jan 14, 2025 21:11:52.299770117 CET50056445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.299916983 CET50056445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.300426960 CET50057445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.304891109 CET44550056115.87.240.2192.168.2.8
                                        Jan 14, 2025 21:11:52.304951906 CET50056445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.305217028 CET44550057115.87.240.2192.168.2.8
                                        Jan 14, 2025 21:11:52.305313110 CET50057445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.305313110 CET50057445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:11:52.310158014 CET44550057115.87.240.2192.168.2.8
                                        Jan 14, 2025 21:11:52.496799946 CET44550006141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:52.496896982 CET50006445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:52.496936083 CET50006445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:52.497009993 CET50006445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:52.501871109 CET44550006141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:52.501903057 CET44550006141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:52.621799946 CET4455000855.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:52.622059107 CET50008445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:52.622059107 CET50008445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:52.622356892 CET50008445192.168.2.855.200.168.1
                                        Jan 14, 2025 21:11:52.627140045 CET4455000855.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:52.627352953 CET4455000855.200.168.1192.168.2.8
                                        Jan 14, 2025 21:11:52.685388088 CET50058445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.690287113 CET4455005855.200.168.2192.168.2.8
                                        Jan 14, 2025 21:11:52.690438032 CET50058445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.690560102 CET50058445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.695599079 CET4455005855.200.168.2192.168.2.8
                                        Jan 14, 2025 21:11:52.695719004 CET50058445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.700861931 CET50059445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.705699921 CET4455005955.200.168.2192.168.2.8
                                        Jan 14, 2025 21:11:52.705822945 CET50059445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.705916882 CET50059445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:11:52.711677074 CET4455005955.200.168.2192.168.2.8
                                        Jan 14, 2025 21:11:53.060230970 CET50060445192.168.2.889.242.253.180
                                        Jan 14, 2025 21:11:53.065125942 CET4455006089.242.253.180192.168.2.8
                                        Jan 14, 2025 21:11:53.065367937 CET50060445192.168.2.889.242.253.180
                                        Jan 14, 2025 21:11:53.065418005 CET50060445192.168.2.889.242.253.180
                                        Jan 14, 2025 21:11:53.065536976 CET50061445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.070346117 CET4455006189.242.253.1192.168.2.8
                                        Jan 14, 2025 21:11:53.070398092 CET4455006089.242.253.180192.168.2.8
                                        Jan 14, 2025 21:11:53.070424080 CET50061445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.070446014 CET50060445192.168.2.889.242.253.180
                                        Jan 14, 2025 21:11:53.070497990 CET50061445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.071357012 CET50062445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.075450897 CET4455006189.242.253.1192.168.2.8
                                        Jan 14, 2025 21:11:53.075501919 CET50061445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.076186895 CET4455006289.242.253.1192.168.2.8
                                        Jan 14, 2025 21:11:53.076240063 CET50062445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.076400042 CET50062445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:11:53.081187010 CET4455006289.242.253.1192.168.2.8
                                        Jan 14, 2025 21:11:53.334836006 CET44550055156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:53.334948063 CET50055445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:53.335031033 CET50055445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:53.335092068 CET50055445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:53.339860916 CET44550055156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:53.339911938 CET44550055156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:53.372608900 CET50063445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:53.377464056 CET4455006340.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:53.377640009 CET50063445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:53.384011984 CET50063445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:11:53.388797998 CET4455006340.118.193.1192.168.2.8
                                        Jan 14, 2025 21:11:54.138091087 CET50064445192.168.2.8128.201.179.149
                                        Jan 14, 2025 21:11:54.143071890 CET44550064128.201.179.149192.168.2.8
                                        Jan 14, 2025 21:11:54.143193007 CET50064445192.168.2.8128.201.179.149
                                        Jan 14, 2025 21:11:54.143215895 CET50064445192.168.2.8128.201.179.149
                                        Jan 14, 2025 21:11:54.143332958 CET50065445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.148180008 CET44550065128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:54.148278952 CET50065445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.148297071 CET50065445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.148359060 CET44550064128.201.179.149192.168.2.8
                                        Jan 14, 2025 21:11:54.148783922 CET50066445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.151134014 CET44550064128.201.179.149192.168.2.8
                                        Jan 14, 2025 21:11:54.151206017 CET50064445192.168.2.8128.201.179.149
                                        Jan 14, 2025 21:11:54.153467894 CET44550065128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:54.153548002 CET50065445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.153748035 CET44550066128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:54.153830051 CET50066445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.153902054 CET50066445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:54.158763885 CET44550066128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:54.403446913 CET44550011193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:54.403532028 CET50011445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:54.406043053 CET50011445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:54.411195993 CET50011445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:54.412018061 CET44550011193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:54.417334080 CET44550011193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:54.668667078 CET4455001255.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:54.668819904 CET50012445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:54.683967113 CET50012445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:54.684012890 CET50012445192.168.2.855.160.71.1
                                        Jan 14, 2025 21:11:54.688951969 CET4455001255.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:54.688986063 CET4455001255.160.71.1192.168.2.8
                                        Jan 14, 2025 21:11:54.793915033 CET50067445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:54.798885107 CET4455006755.160.71.2192.168.2.8
                                        Jan 14, 2025 21:11:54.799043894 CET50067445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:54.803059101 CET50067445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:54.808490038 CET4455006755.160.71.2192.168.2.8
                                        Jan 14, 2025 21:11:54.808602095 CET50067445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:55.009704113 CET50068445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:55.014630079 CET4455006855.160.71.2192.168.2.8
                                        Jan 14, 2025 21:11:55.014714003 CET50068445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:55.014821053 CET50068445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:11:55.019675970 CET4455006855.160.71.2192.168.2.8
                                        Jan 14, 2025 21:11:55.154367924 CET50069445192.168.2.814.33.85.220
                                        Jan 14, 2025 21:11:55.159255028 CET4455006914.33.85.220192.168.2.8
                                        Jan 14, 2025 21:11:55.159344912 CET50069445192.168.2.814.33.85.220
                                        Jan 14, 2025 21:11:55.159416914 CET50069445192.168.2.814.33.85.220
                                        Jan 14, 2025 21:11:55.159562111 CET50070445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.164285898 CET4455006914.33.85.220192.168.2.8
                                        Jan 14, 2025 21:11:55.164334059 CET50069445192.168.2.814.33.85.220
                                        Jan 14, 2025 21:11:55.164344072 CET4455007014.33.85.1192.168.2.8
                                        Jan 14, 2025 21:11:55.164412022 CET50070445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.164470911 CET50070445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.165002108 CET50071445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.169384956 CET4455007014.33.85.1192.168.2.8
                                        Jan 14, 2025 21:11:55.169434071 CET50070445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.169804096 CET4455007114.33.85.1192.168.2.8
                                        Jan 14, 2025 21:11:55.169857025 CET50071445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.169893980 CET50071445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:11:55.174639940 CET4455007114.33.85.1192.168.2.8
                                        Jan 14, 2025 21:11:55.512744904 CET50072445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:55.517700911 CET44550072141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:55.517802000 CET50072445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:55.517833948 CET50072445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:11:55.522756100 CET44550072141.52.193.1192.168.2.8
                                        Jan 14, 2025 21:11:55.919711113 CET44550066128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:55.919791937 CET50066445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:55.919835091 CET50066445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:55.919847965 CET50066445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:55.924657106 CET44550066128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:55.924673080 CET44550066128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:56.091293097 CET50073445192.168.2.8195.65.195.128
                                        Jan 14, 2025 21:11:56.096203089 CET44550073195.65.195.128192.168.2.8
                                        Jan 14, 2025 21:11:56.096326113 CET50073445192.168.2.8195.65.195.128
                                        Jan 14, 2025 21:11:56.096364021 CET50073445192.168.2.8195.65.195.128
                                        Jan 14, 2025 21:11:56.096748114 CET50074445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.101583004 CET44550074195.65.195.1192.168.2.8
                                        Jan 14, 2025 21:11:56.101759911 CET50074445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.101759911 CET50074445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.102056980 CET50075445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.103308916 CET44550073195.65.195.128192.168.2.8
                                        Jan 14, 2025 21:11:56.103413105 CET50073445192.168.2.8195.65.195.128
                                        Jan 14, 2025 21:11:56.106870890 CET44550075195.65.195.1192.168.2.8
                                        Jan 14, 2025 21:11:56.106955051 CET50075445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.107007027 CET50075445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.108333111 CET44550074195.65.195.1192.168.2.8
                                        Jan 14, 2025 21:11:56.108503103 CET44550074195.65.195.1192.168.2.8
                                        Jan 14, 2025 21:11:56.108714104 CET50074445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:11:56.111793041 CET44550075195.65.195.1192.168.2.8
                                        Jan 14, 2025 21:11:56.340915918 CET50076445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:56.345746994 CET44550076156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:56.345820904 CET50076445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:56.345879078 CET50076445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:56.350708008 CET44550076156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:56.481801987 CET44550015142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:56.481950045 CET50015445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:56.482019901 CET50015445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:56.482095003 CET50015445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:56.488038063 CET44550015142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:56.488050938 CET44550015142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:56.577006102 CET44550016141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:56.577161074 CET50016445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:56.577234983 CET50016445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:56.577291965 CET50016445192.168.2.8141.15.78.1
                                        Jan 14, 2025 21:11:56.582890034 CET44550016141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:56.582999945 CET44550016141.15.78.1192.168.2.8
                                        Jan 14, 2025 21:11:56.637865067 CET50077445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.642688036 CET44550077141.15.78.2192.168.2.8
                                        Jan 14, 2025 21:11:56.642764091 CET50077445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.642818928 CET50077445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.643218040 CET50078445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.647955894 CET44550077141.15.78.2192.168.2.8
                                        Jan 14, 2025 21:11:56.648057938 CET44550078141.15.78.2192.168.2.8
                                        Jan 14, 2025 21:11:56.648119926 CET50077445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.648174047 CET50078445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.648207903 CET50078445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:11:56.653014898 CET44550078141.15.78.2192.168.2.8
                                        Jan 14, 2025 21:11:56.966178894 CET50079445192.168.2.8163.241.66.124
                                        Jan 14, 2025 21:11:56.971034050 CET44550079163.241.66.124192.168.2.8
                                        Jan 14, 2025 21:11:56.971112013 CET50079445192.168.2.8163.241.66.124
                                        Jan 14, 2025 21:11:56.971148968 CET50079445192.168.2.8163.241.66.124
                                        Jan 14, 2025 21:11:56.971297026 CET50080445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.976150036 CET44550079163.241.66.124192.168.2.8
                                        Jan 14, 2025 21:11:56.976162910 CET44550080163.241.66.1192.168.2.8
                                        Jan 14, 2025 21:11:56.976200104 CET50079445192.168.2.8163.241.66.124
                                        Jan 14, 2025 21:11:56.976243973 CET50080445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.976316929 CET50080445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.976600885 CET50081445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.981156111 CET44550080163.241.66.1192.168.2.8
                                        Jan 14, 2025 21:11:56.981210947 CET50080445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.981468916 CET44550081163.241.66.1192.168.2.8
                                        Jan 14, 2025 21:11:56.981535912 CET50081445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.981589079 CET50081445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:11:56.986330032 CET44550081163.241.66.1192.168.2.8
                                        Jan 14, 2025 21:11:57.419259071 CET50083445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:57.424221039 CET44550083193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:57.424350023 CET50083445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:57.424367905 CET50083445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:11:57.429214001 CET44550083193.179.167.1192.168.2.8
                                        Jan 14, 2025 21:11:57.761835098 CET44550076156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:57.761954069 CET50076445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:57.761998892 CET50076445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:57.762047052 CET50076445192.168.2.8156.249.22.1
                                        Jan 14, 2025 21:11:57.771872997 CET44550076156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:57.771903992 CET44550076156.249.22.1192.168.2.8
                                        Jan 14, 2025 21:11:57.794365883 CET50084445192.168.2.8112.44.113.7
                                        Jan 14, 2025 21:11:57.801053047 CET44550084112.44.113.7192.168.2.8
                                        Jan 14, 2025 21:11:57.801196098 CET50084445192.168.2.8112.44.113.7
                                        Jan 14, 2025 21:11:57.801196098 CET50084445192.168.2.8112.44.113.7
                                        Jan 14, 2025 21:11:57.801410913 CET50085445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.807938099 CET44550085112.44.113.1192.168.2.8
                                        Jan 14, 2025 21:11:57.808003902 CET44550084112.44.113.7192.168.2.8
                                        Jan 14, 2025 21:11:57.808037043 CET50085445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.808113098 CET50085445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.808131933 CET50084445192.168.2.8112.44.113.7
                                        Jan 14, 2025 21:11:57.808479071 CET50086445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.815016031 CET44550085112.44.113.1192.168.2.8
                                        Jan 14, 2025 21:11:57.815052986 CET44550086112.44.113.1192.168.2.8
                                        Jan 14, 2025 21:11:57.815574884 CET50085445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.815619946 CET50086445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.815677881 CET50086445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:11:57.824834108 CET44550086112.44.113.1192.168.2.8
                                        Jan 14, 2025 21:11:57.825229883 CET50087445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.835138083 CET44550087156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:57.835246086 CET50087445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.835289001 CET50087445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.835706949 CET50088445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.843628883 CET44550087156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:57.843997955 CET44550087156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:57.844031096 CET44550088156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:57.844057083 CET50087445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.844150066 CET50088445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.844151020 CET50088445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:57.851286888 CET44550088156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:58.435899973 CET44550019141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:58.435992002 CET50019445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:58.436028957 CET50019445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:58.436090946 CET50019445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:11:58.441654921 CET44550019141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:58.441665888 CET44550019141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:11:58.560080051 CET50089445192.168.2.889.115.84.2
                                        Jan 14, 2025 21:11:58.564973116 CET4455008989.115.84.2192.168.2.8
                                        Jan 14, 2025 21:11:58.565115929 CET50089445192.168.2.889.115.84.2
                                        Jan 14, 2025 21:11:58.565220118 CET50089445192.168.2.889.115.84.2
                                        Jan 14, 2025 21:11:58.565418005 CET50090445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.570297956 CET4455008989.115.84.2192.168.2.8
                                        Jan 14, 2025 21:11:58.570333004 CET4455009089.115.84.1192.168.2.8
                                        Jan 14, 2025 21:11:58.570389986 CET50089445192.168.2.889.115.84.2
                                        Jan 14, 2025 21:11:58.570446968 CET50090445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.570548058 CET50090445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.570924044 CET50091445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.575397015 CET4455009089.115.84.1192.168.2.8
                                        Jan 14, 2025 21:11:58.575464964 CET50090445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.575941086 CET4455009189.115.84.1192.168.2.8
                                        Jan 14, 2025 21:11:58.576029062 CET50091445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.576086044 CET50091445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:11:58.581449986 CET4455009189.115.84.1192.168.2.8
                                        Jan 14, 2025 21:11:58.636732101 CET4455002098.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:58.636872053 CET50020445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:58.636969090 CET50020445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:58.637053013 CET50020445192.168.2.898.250.30.1
                                        Jan 14, 2025 21:11:58.642775059 CET4455002098.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:58.642817974 CET4455002098.250.30.1192.168.2.8
                                        Jan 14, 2025 21:11:58.700472116 CET50092445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.705467939 CET4455009298.250.30.2192.168.2.8
                                        Jan 14, 2025 21:11:58.705610037 CET50092445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.705610037 CET50092445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.706310987 CET50093445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.711009026 CET4455009298.250.30.2192.168.2.8
                                        Jan 14, 2025 21:11:58.711096048 CET50092445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.711154938 CET4455009398.250.30.2192.168.2.8
                                        Jan 14, 2025 21:11:58.711257935 CET50093445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.711257935 CET50093445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:11:58.716507912 CET4455009398.250.30.2192.168.2.8
                                        Jan 14, 2025 21:11:58.934771061 CET50094445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:58.939677954 CET44550094128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:58.939811945 CET50094445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:58.939867973 CET50094445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:11:58.945017099 CET44550094128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:11:59.252284050 CET44550088156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:59.252424002 CET50088445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:59.252506971 CET50088445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:59.252567053 CET50088445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:11:59.257247925 CET44550088156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:59.257338047 CET44550088156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:11:59.497127056 CET50096445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:59.501904011 CET44550096142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:11:59.502000093 CET50096445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:59.502065897 CET50096445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:11:59.508012056 CET44550096142.73.125.1192.168.2.8
                                        Jan 14, 2025 21:12:00.467288971 CET44550023177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:12:00.467474937 CET50023445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:00.467562914 CET50023445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:00.467704058 CET50023445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:00.472349882 CET44550023177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:12:00.472601891 CET44550023177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:12:00.637454987 CET44550024160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:12:00.637521982 CET50024445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:12:00.637849092 CET50024445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:12:00.637912989 CET50024445192.168.2.8160.49.44.1
                                        Jan 14, 2025 21:12:00.642746925 CET44550024160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:12:00.642764091 CET44550024160.49.44.1192.168.2.8
                                        Jan 14, 2025 21:12:00.701834917 CET50100445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.707392931 CET44550100160.49.44.2192.168.2.8
                                        Jan 14, 2025 21:12:00.707484961 CET50100445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.707519054 CET50100445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.707978010 CET50101445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.712472916 CET44550100160.49.44.2192.168.2.8
                                        Jan 14, 2025 21:12:00.712532997 CET50100445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.713668108 CET44550101160.49.44.2192.168.2.8
                                        Jan 14, 2025 21:12:00.713727951 CET50101445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.713767052 CET50101445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:00.718508005 CET44550101160.49.44.2192.168.2.8
                                        Jan 14, 2025 21:12:00.735095024 CET44550094128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:12:00.735349894 CET50094445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:12:00.735349894 CET50094445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:12:00.735349894 CET50094445192.168.2.8128.201.179.1
                                        Jan 14, 2025 21:12:00.740207911 CET44550094128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:12:00.740226030 CET44550094128.201.179.1192.168.2.8
                                        Jan 14, 2025 21:12:00.794044971 CET50102445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.799370050 CET44550102128.201.179.2192.168.2.8
                                        Jan 14, 2025 21:12:00.799473047 CET50102445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.799489975 CET50102445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.800139904 CET50103445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.804493904 CET44550102128.201.179.2192.168.2.8
                                        Jan 14, 2025 21:12:00.804563046 CET50102445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.805669069 CET44550103128.201.179.2192.168.2.8
                                        Jan 14, 2025 21:12:00.805761099 CET50103445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.805761099 CET50103445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:00.810537100 CET44550103128.201.179.2192.168.2.8
                                        Jan 14, 2025 21:12:01.451054096 CET50106445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:12:01.456015110 CET44550106141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:12:01.456155062 CET50106445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:12:01.456201077 CET50106445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:12:01.461035013 CET44550106141.229.167.1192.168.2.8
                                        Jan 14, 2025 21:12:02.262671947 CET50112445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:12:02.267775059 CET44550112156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:12:02.267857075 CET50112445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:12:02.267893076 CET50112445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:12:02.272758007 CET44550112156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:12:02.481376886 CET44550027162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:12:02.481539965 CET50027445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:02.481931925 CET50027445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:02.482002974 CET50027445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:02.486784935 CET44550027162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:12:02.486835957 CET44550027162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:12:02.668935061 CET4455002842.63.214.1192.168.2.8
                                        Jan 14, 2025 21:12:02.671768904 CET50028445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:12:02.671838999 CET50028445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:12:02.671909094 CET50028445192.168.2.842.63.214.1
                                        Jan 14, 2025 21:12:02.676717997 CET4455002842.63.214.1192.168.2.8
                                        Jan 14, 2025 21:12:02.676760912 CET4455002842.63.214.1192.168.2.8
                                        Jan 14, 2025 21:12:02.731786966 CET50116445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.736778975 CET4455011642.63.214.2192.168.2.8
                                        Jan 14, 2025 21:12:02.741771936 CET50116445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.741900921 CET50116445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.742419958 CET50117445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.746762991 CET4455011642.63.214.2192.168.2.8
                                        Jan 14, 2025 21:12:02.746882915 CET50116445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.747405052 CET4455011742.63.214.2192.168.2.8
                                        Jan 14, 2025 21:12:02.747484922 CET50117445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.747524023 CET50117445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:02.752346039 CET4455011742.63.214.2192.168.2.8
                                        Jan 14, 2025 21:12:03.481995106 CET50124445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:03.486857891 CET44550124177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:12:03.486990929 CET50124445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:03.487059116 CET50124445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:03.491813898 CET44550124177.167.133.1192.168.2.8
                                        Jan 14, 2025 21:12:03.664709091 CET44550112156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:12:03.664833069 CET50112445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:12:03.664969921 CET50112445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:12:03.665095091 CET50112445192.168.2.8156.249.22.2
                                        Jan 14, 2025 21:12:03.669717073 CET44550112156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:12:03.669841051 CET44550112156.249.22.2192.168.2.8
                                        Jan 14, 2025 21:12:03.716058016 CET50126445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.720825911 CET44550126156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:03.720921993 CET50126445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.720972061 CET50126445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.721504927 CET50127445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.725925922 CET44550126156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:03.725987911 CET50126445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.726346970 CET44550127156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:03.726408005 CET50127445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.726453066 CET50127445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:03.731169939 CET44550127156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:04.391566038 CET4455003183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:12:04.391829967 CET50031445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:04.393028975 CET50031445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:04.393083096 CET50031445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:04.397888899 CET4455003183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:12:04.397921085 CET4455003183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:12:04.658881903 CET4455003226.34.166.1192.168.2.8
                                        Jan 14, 2025 21:12:04.658967018 CET50032445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:12:04.659056902 CET50032445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:12:04.659092903 CET50032445192.168.2.826.34.166.1
                                        Jan 14, 2025 21:12:04.664033890 CET4455003226.34.166.1192.168.2.8
                                        Jan 14, 2025 21:12:04.664067030 CET4455003226.34.166.1192.168.2.8
                                        Jan 14, 2025 21:12:04.724814892 CET50140445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.729662895 CET4455014026.34.166.2192.168.2.8
                                        Jan 14, 2025 21:12:04.729757071 CET50140445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.729919910 CET50140445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.730886936 CET50141445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.734694958 CET4455014026.34.166.2192.168.2.8
                                        Jan 14, 2025 21:12:04.734755039 CET50140445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.735678911 CET4455014126.34.166.2192.168.2.8
                                        Jan 14, 2025 21:12:04.735757113 CET50141445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.735776901 CET50141445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:04.740571022 CET4455014126.34.166.2192.168.2.8
                                        Jan 14, 2025 21:12:05.136868954 CET44550127156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:05.137104988 CET50127445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:05.137201071 CET50127445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:05.137201071 CET50127445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:05.141984940 CET44550127156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:05.141997099 CET44550127156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:05.497210979 CET50151445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:05.502576113 CET44550151162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:12:05.502711058 CET50151445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:05.502711058 CET50151445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:05.507884026 CET44550151162.239.127.1192.168.2.8
                                        Jan 14, 2025 21:12:06.653153896 CET4455003699.242.202.1192.168.2.8
                                        Jan 14, 2025 21:12:06.653218031 CET50036445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:12:06.653253078 CET50036445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:12:06.653290987 CET50036445192.168.2.899.242.202.1
                                        Jan 14, 2025 21:12:06.658058882 CET4455003699.242.202.1192.168.2.8
                                        Jan 14, 2025 21:12:06.658073902 CET4455003699.242.202.1192.168.2.8
                                        Jan 14, 2025 21:12:06.715934992 CET50174445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.720746994 CET4455017499.242.202.2192.168.2.8
                                        Jan 14, 2025 21:12:06.720851898 CET50174445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.720884085 CET50174445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.721259117 CET50175445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.725774050 CET4455017499.242.202.2192.168.2.8
                                        Jan 14, 2025 21:12:06.725835085 CET50174445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.726020098 CET4455017599.242.202.2192.168.2.8
                                        Jan 14, 2025 21:12:06.726088047 CET50175445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.726130009 CET50175445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:06.730868101 CET4455017599.242.202.2192.168.2.8
                                        Jan 14, 2025 21:12:07.403517008 CET50191445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:07.408415079 CET4455019183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:12:07.408535957 CET50191445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:07.408562899 CET50191445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:07.413419008 CET4455019183.213.152.1192.168.2.8
                                        Jan 14, 2025 21:12:07.762581110 CET44550039183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:12:07.762697935 CET50039445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:12:07.762775898 CET50039445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:12:07.762811899 CET50039445192.168.2.8183.129.174.1
                                        Jan 14, 2025 21:12:07.767611027 CET44550039183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:12:07.767643929 CET44550039183.129.174.1192.168.2.8
                                        Jan 14, 2025 21:12:08.137834072 CET50212445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:08.142709017 CET44550212156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:08.142817020 CET50212445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:08.142913103 CET50212445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:08.147814989 CET44550212156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:08.652600050 CET44550040143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:12:08.652714968 CET50040445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:12:08.652753115 CET50040445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:12:08.652791977 CET50040445192.168.2.8143.119.194.1
                                        Jan 14, 2025 21:12:08.657608032 CET44550040143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:12:08.657618999 CET44550040143.119.194.1192.168.2.8
                                        Jan 14, 2025 21:12:08.715835094 CET50231445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.720727921 CET44550231143.119.194.2192.168.2.8
                                        Jan 14, 2025 21:12:08.720824957 CET50231445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.720932961 CET50231445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.721739054 CET50232445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.726538897 CET44550232143.119.194.2192.168.2.8
                                        Jan 14, 2025 21:12:08.726605892 CET50232445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.726634979 CET50232445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.727051020 CET44550231143.119.194.2192.168.2.8
                                        Jan 14, 2025 21:12:08.727092981 CET50231445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:08.731523037 CET44550232143.119.194.2192.168.2.8
                                        Jan 14, 2025 21:12:09.279079914 CET44550043199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:12:09.279258013 CET50043445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:12:09.279309988 CET50043445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:12:09.279320002 CET50043445192.168.2.8199.166.218.1
                                        Jan 14, 2025 21:12:09.284439087 CET44550043199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:12:09.284471989 CET44550043199.166.218.1192.168.2.8
                                        Jan 14, 2025 21:12:09.570481062 CET44550212156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:09.570583105 CET50212445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:09.570632935 CET50212445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:09.570677042 CET50212445192.168.2.8156.249.22.3
                                        Jan 14, 2025 21:12:09.575537920 CET44550212156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:09.575568914 CET44550212156.249.22.3192.168.2.8
                                        Jan 14, 2025 21:12:09.622358084 CET50286445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.627125025 CET44550286156.249.22.4192.168.2.8
                                        Jan 14, 2025 21:12:09.627222061 CET50286445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.627248049 CET50286445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.627646923 CET50288445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.632199049 CET44550286156.249.22.4192.168.2.8
                                        Jan 14, 2025 21:12:09.632325888 CET50286445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.632468939 CET44550288156.249.22.4192.168.2.8
                                        Jan 14, 2025 21:12:09.632539034 CET50288445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.632569075 CET50288445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:09.637345076 CET44550288156.249.22.4192.168.2.8
                                        Jan 14, 2025 21:12:10.685848951 CET44550044134.75.40.1192.168.2.8
                                        Jan 14, 2025 21:12:10.685935020 CET50044445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:12:10.716072083 CET4455004750.171.143.1192.168.2.8
                                        Jan 14, 2025 21:12:10.716149092 CET50047445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:12:11.043117046 CET44550288156.249.22.4192.168.2.8
                                        Jan 14, 2025 21:12:11.043190002 CET50288445192.168.2.8156.249.22.4
                                        Jan 14, 2025 21:12:11.285324097 CET50093445192.168.2.898.250.30.2
                                        Jan 14, 2025 21:12:11.285423040 CET50047445192.168.2.850.171.143.1
                                        Jan 14, 2025 21:12:11.285505056 CET50078445192.168.2.8141.15.78.2
                                        Jan 14, 2025 21:12:11.285538912 CET50101445192.168.2.8160.49.44.2
                                        Jan 14, 2025 21:12:11.285698891 CET50175445192.168.2.899.242.202.2
                                        Jan 14, 2025 21:12:11.285731077 CET50057445192.168.2.8115.87.240.2
                                        Jan 14, 2025 21:12:11.285754919 CET50059445192.168.2.855.200.168.2
                                        Jan 14, 2025 21:12:11.285792112 CET50068445192.168.2.855.160.71.2
                                        Jan 14, 2025 21:12:11.285832882 CET50044445192.168.2.8134.75.40.1
                                        Jan 14, 2025 21:12:11.285868883 CET50052445192.168.2.8191.114.167.1
                                        Jan 14, 2025 21:12:11.285891056 CET50051445192.168.2.815.95.97.1
                                        Jan 14, 2025 21:12:11.285927057 CET50062445192.168.2.889.242.253.1
                                        Jan 14, 2025 21:12:11.285929918 CET50063445192.168.2.840.118.193.1
                                        Jan 14, 2025 21:12:11.285964966 CET50071445192.168.2.814.33.85.1
                                        Jan 14, 2025 21:12:11.285981894 CET50072445192.168.2.8141.52.193.1
                                        Jan 14, 2025 21:12:11.286024094 CET50075445192.168.2.8195.65.195.1
                                        Jan 14, 2025 21:12:11.286098957 CET50081445192.168.2.8163.241.66.1
                                        Jan 14, 2025 21:12:11.286119938 CET50083445192.168.2.8193.179.167.1
                                        Jan 14, 2025 21:12:11.286154985 CET50086445192.168.2.8112.44.113.1
                                        Jan 14, 2025 21:12:11.286163092 CET50096445192.168.2.8142.73.125.1
                                        Jan 14, 2025 21:12:11.286195993 CET50091445192.168.2.889.115.84.1
                                        Jan 14, 2025 21:12:11.286214113 CET50103445192.168.2.8128.201.179.2
                                        Jan 14, 2025 21:12:11.286257029 CET50106445192.168.2.8141.229.167.1
                                        Jan 14, 2025 21:12:11.286279917 CET50124445192.168.2.8177.167.133.1
                                        Jan 14, 2025 21:12:11.286333084 CET50117445192.168.2.842.63.214.2
                                        Jan 14, 2025 21:12:11.286353111 CET50141445192.168.2.826.34.166.2
                                        Jan 14, 2025 21:12:11.286391973 CET50151445192.168.2.8162.239.127.1
                                        Jan 14, 2025 21:12:11.286443949 CET50191445192.168.2.883.213.152.1
                                        Jan 14, 2025 21:12:11.286582947 CET50232445192.168.2.8143.119.194.2
                                        Jan 14, 2025 21:12:11.286902905 CET50288445192.168.2.8156.249.22.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 21:11:04.945759058 CET5845153192.168.2.81.1.1.1
                                        Jan 14, 2025 21:11:04.954884052 CET53584511.1.1.1192.168.2.8
                                        Jan 14, 2025 21:11:44.457616091 CET138138192.168.2.8192.168.2.255
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 14, 2025 21:11:04.945759058 CET192.168.2.81.1.1.10x7b30Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 14, 2025 21:11:04.954884052 CET1.1.1.1192.168.2.80x7b30No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                        Jan 14, 2025 21:11:04.954884052 CET1.1.1.1192.168.2.80x7b30No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                        Jan 14, 2025 21:12:17.467755079 CET1.1.1.1192.168.2.80xeba2No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                        Jan 14, 2025 21:12:17.467755079 CET1.1.1.1192.168.2.80xeba2No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.849704104.16.167.228803404C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 21:11:04.970386982 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 21:11:05.467102051 CET778INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 20:11:05 GMT
                                        Content-Type: text/html
                                        Content-Length: 607
                                        Connection: close
                                        Server: cloudflare
                                        CF-RAY: 902045eebd9d8c72-EWR
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.849705104.16.167.228802384C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 21:11:06.260993004 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 21:11:06.745199919 CET778INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 20:11:06 GMT
                                        Content-Type: text/html
                                        Content-Length: 607
                                        Connection: close
                                        Server: cloudflare
                                        CF-RAY: 902045f6b8ae4402-EWR
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.849717104.16.167.228806816C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 21:11:07.248406887 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 21:11:07.717003107 CET778INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 20:11:07 GMT
                                        Content-Type: text/html
                                        Content-Length: 607
                                        Connection: close
                                        Server: cloudflare
                                        CF-RAY: 902045fcc98742bb-EWR
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:15:11:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\loaddll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll"
                                        Imagebase:0x360000
                                        File size:126'464 bytes
                                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:15:11:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:15:11:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1
                                        Imagebase:0xa40000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:15:11:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe C:\Users\user\Desktop\Yx3rRuVx3c.dll,PlayGame
                                        Imagebase:0x260000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:15:11:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",#1
                                        Imagebase:0x260000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:15:11:03
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:281BE5C102C0A2BB6061B3DE31E0EDCF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1462495225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1462495225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1462063130.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 98%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:8
                                        Start time:15:11:04
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:281BE5C102C0A2BB6061B3DE31E0EDCF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1477616825.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1477138066.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2123060566.0000000001EC2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2123060566.0000000001EC2000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2123406007.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2123406007.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Target ID:9
                                        Start time:15:11:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\tasksche.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                        Imagebase:0x400000
                                        File size:3'514'368 bytes
                                        MD5 hash:B058C1426BA4967961EBB505C1E7ECC6
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1487139439.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 90%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:10
                                        Start time:15:11:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\Yx3rRuVx3c.dll",PlayGame
                                        Imagebase:0x260000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:15:11:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:281BE5C102C0A2BB6061B3DE31E0EDCF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1489242948.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1489385533.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1489385533.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1497955176.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1498211884.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1498211884.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Target ID:12
                                        Start time:15:11:06
                                        Start date:14/01/2025
                                        Path:C:\Windows\tasksche.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                        Imagebase:0x400000
                                        File size:3'514'368 bytes
                                        MD5 hash:B058C1426BA4967961EBB505C1E7ECC6
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1497327919.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1496586530.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:71.7%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:63.2%
                                          Total number of Nodes:38
                                          Total number of Limit Nodes:9
                                          execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FAF0EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                          • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                          • CreateProcessA.KERNELBASE ref: 00407EE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1488094863.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1488077169.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488110460.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488181450.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4281112323-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1488094863.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1488077169.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488110460.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488181450.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1488094863.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1488077169.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488110460.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488181450.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                          • API String ID: 774561529-2942426231
                                          • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                          • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FAF0EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1488094863.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1488077169.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488110460.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488181450.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                          • API String ID: 3340711343-4063779371
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FAF0EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1488094863.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1488077169.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488110460.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488129879.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488181450.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1488300281.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.0
                                          • API String ID: 4274534310-3729025388
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Execution Graph

                                          Execution Coverage:34.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:36
                                          Total number of Limit Nodes:2

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FAF0EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2121866209.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2121849480.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121886586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121961541.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121979380.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.0
                                          • API String ID: 4274534310-3729025388
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2121866209.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2121849480.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121886586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121961541.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121979380.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                          • API String ID: 774561529-2942426231
                                          • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                          • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FAF0EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2121866209.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2121849480.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121886586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121961541.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121979380.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                          • API String ID: 3340711343-4063779371
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FAF0EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2121866209.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2121849480.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121886586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121961541.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121979380.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4072214828-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2121866209.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2121849480.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121886586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121903749.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121945570.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121961541.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2121979380.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2122064339.0000000000807000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                          APIs
                                          • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: /../$/..\$\../$\..\
                                          • API String ID: 3510742995-3885502717
                                          • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                          • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                          • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                          • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                          APIs
                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                          • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                          • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                          • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                          • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                          • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                          • API String ID: 2238633743-2459060434
                                          • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                          • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                          • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                          • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                          APIs
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                          • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$ManagerStart
                                          • String ID: cmd.exe /c "%s"
                                          • API String ID: 1485051382-955883872
                                          • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                          • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                          • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                          • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                          • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                          • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrow$memcpy
                                          • String ID:
                                          • API String ID: 1881450474-3916222277
                                          • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                          • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                          • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                          • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                          APIs
                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                          • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                          • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                          • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                          • String ID: WANACRY!
                                          • API String ID: 283026544-1240840912
                                          • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                          • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                          • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                          • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                          • String ID: $Q;@
                                          • API String ID: 2382887404-262343263
                                          • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                          • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                          • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                          • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                          • String ID:
                                          • API String ID: 2382887404-3916222277
                                          • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                          • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                          • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                          • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                          APIs
                                          • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                          • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                          • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$FreeProcessfree
                                          • String ID:
                                          • API String ID: 3428986607-0
                                          • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                          • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                          • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                          • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrow
                                          • String ID:
                                          • API String ID: 941485209-0
                                          • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                          • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                          • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                          • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrow
                                          • String ID:
                                          • API String ID: 941485209-0
                                          • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                          • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                          • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                          • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: memcpy
                                          • String ID:
                                          • API String ID: 3510742995-0
                                          • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                          • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                          • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                          • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ContextCryptRelease
                                          • String ID:
                                          • API String ID: 829835001-0
                                          • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                          • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                          • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                          • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                          • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                          • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                          • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                          • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                          • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                          • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                          APIs
                                            • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                          • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                          • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                          • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                          • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                          • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                          • API String ID: 2238633743-1294736154
                                          • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                          • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                          • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                          • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s$%s%s%s$:$\
                                          • API String ID: 0-1100577047
                                          • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                          • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                          • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                          • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                          APIs
                                          • __p___argv.MSVCRT(0040F538), ref: 00402040
                                          • strcmp.MSVCRT(?), ref: 0040204B
                                          • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                          • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                            • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                          • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                          • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                          • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                            • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                            • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                            • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                            • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                          • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                          • API String ID: 1074704982-2844324180
                                          • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                          • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                          • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                          • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                          APIs
                                          • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                          • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                          • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                          • strlen.MSVCRT(?), ref: 004011A7
                                          • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                          • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                          • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                          • String ID: 0@$Software\$WanaCrypt0r
                                          • API String ID: 865909632-3421300005
                                          • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                          • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                          • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                          • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                          • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                          • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                          • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                          • String ID: %s\Intel$%s\ProgramData
                                          • API String ID: 3806094219-198707228
                                          • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                          • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                          • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                          • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                          APIs
                                            • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                          • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                          • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                          • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                            • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                          • SetLastError.KERNEL32(0000045A), ref: 00402430
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                          • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                          • API String ID: 1900561814-3657104962
                                          • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                          • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                          • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                          • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                          APIs
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                          • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                          • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                          • String ID: %s\%s
                                          • API String ID: 1036847564-4073750446
                                          • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                          • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                          • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                          • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                          APIs
                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                          • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                          • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                          • CloseHandle.KERNEL32(?), ref: 004010EC
                                          • CloseHandle.KERNEL32(?), ref: 004010F1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                          • String ID: D
                                          • API String ID: 786732093-2746444292
                                          • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                          • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                          • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                          • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                          APIs
                                          • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                          • __p__fmode.MSVCRT ref: 004077FC
                                          • __p__commode.MSVCRT ref: 0040780A
                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                          • String ID:
                                          • API String ID: 3626615345-0
                                          • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                          • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                          • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                          • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                          APIs
                                          • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                            • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                          • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                          • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                          • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                          • String ID:
                                          • API String ID: 2141228402-0
                                          • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                          • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                          • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                          • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                          APIs
                                          • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                          • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                          • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Read$realloc
                                          • String ID: ?!@
                                          • API String ID: 1241503663-708128716
                                          • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                          • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                          • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                          • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: rand$wcslen$ComputerNamesrand
                                          • String ID:
                                          • API String ID: 3058258771-0
                                          • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                          • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                          • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                          • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                          APIs
                                          • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                          • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                          • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                          • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                          • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                          • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                          • String ID:
                                          • API String ID: 2935503933-0
                                          • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                          • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                          • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                          • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                          APIs
                                          • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                          • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                          • Sleep.KERNEL32(000003E8), ref: 00401F40
                                          • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandleMutexOpenSleepsprintf
                                          • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                          • API String ID: 2780352083-2959021817
                                          • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                          • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                          • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                          • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                          • String ID:
                                          • API String ID: 2382887404-0
                                          • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                          • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                          • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                          • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                          APIs
                                          • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                          • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                          • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                          • fclose.MSVCRT(00000000), ref: 00401058
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: fclosefopenfreadfwrite
                                          • String ID: c.wnry
                                          • API String ID: 4000964834-3240288721
                                          • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                          • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                          • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                          • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                          APIs
                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                          • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                          • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                          • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                          • String ID:
                                          • API String ID: 2811923685-0
                                          • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                          • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                          • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                          • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                          APIs
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                          • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Pointer$??2@Create
                                          • String ID:
                                          • API String ID: 1331958074-0
                                          • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                          • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                          • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                          • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                          APIs
                                          • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                          • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_stricmp
                                          • String ID: P!@
                                          • API String ID: 1278613211-1774101457
                                          • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                          • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                          • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                          • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                          APIs
                                          • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                          • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AttributesFilestrcmp
                                          • String ID: c.wnry
                                          • API String ID: 3324900478-3240288721
                                          • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                          • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                          • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                          • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                          APIs
                                          • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                          • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??3@CloseHandle
                                          • String ID: $l@
                                          • API String ID: 3816424416-2140230165
                                          • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                          • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                          • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                          • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                          • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1487611347.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.1487590295.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487629482.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487644751.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.1487660922.00000000004F7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$Leave$Entermemcpy
                                          • String ID:
                                          • API String ID: 3435569088-0
                                          • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                          • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                          • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                          • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65