Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hsmSW6Eifl.dll

Overview

General Information

Sample name:hsmSW6Eifl.dll
renamed because original name is a hash value
Original sample name:74bc261ad11bc9f1d57641998dc1fe69.dll
Analysis ID:1591286
MD5:74bc261ad11bc9f1d57641998dc1fe69
SHA1:4ad5ed670cc99370808f3c211ef15b7672e6b4c9
SHA256:8b04901e2af43dc45cf1a8912849c51f340c308159644fbc31cb58c8478e3faa
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7500 cmdline: loaddll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7556 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7580 cmdline: rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7644 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 22A591EE2E6E2B72CAF6F0BCEE2DDE20)
          • tasksche.exe (PID: 7880 cmdline: C:\WINDOWS\tasksche.exe /i MD5: A089E2E733A58751CAB58BA261ACC543)
    • rundll32.exe (PID: 7564 cmdline: rundll32.exe C:\Users\user\Desktop\hsmSW6Eifl.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7912 cmdline: rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7936 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 22A591EE2E6E2B72CAF6F0BCEE2DDE20)
        • tasksche.exe (PID: 8008 cmdline: C:\WINDOWS\tasksche.exe /i MD5: A089E2E733A58751CAB58BA261ACC543)
  • svchost.exe (PID: 7724 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • mssecsvc.exe (PID: 7804 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 22A591EE2E6E2B72CAF6F0BCEE2DDE20)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
hsmSW6Eifl.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    hsmSW6Eifl.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    hsmSW6Eifl.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000009.00000000.1323343347.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            0000000A.00000000.1333622807.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            9.2.mssecsvc.exe.23d28c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            9.2.mssecsvc.exe.1ea8084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            12.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              12.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              12.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries

              System Summary

              barindex
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, ProcessId: 7724, ProcessName: svchost.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.665911+010020315153Misc activity104.16.167.22880192.168.2.749701TCP
              2025-01-14T21:16:15.613062+010020315153Misc activity104.16.167.22880192.168.2.749702TCP
              2025-01-14T21:16:16.886924+010020315153Misc activity104.16.167.22880192.168.2.749719TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.088455+010020242911A Network Trojan was detected192.168.2.7567551.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.631833+010020242981A Network Trojan was detected192.168.2.749701104.16.167.22880TCP
              2025-01-14T21:16:15.612802+010020242981A Network Trojan was detected192.168.2.749702104.16.167.22880TCP
              2025-01-14T21:16:16.886897+010020242981A Network Trojan was detected192.168.2.749719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.631833+010020242991A Network Trojan was detected192.168.2.749701104.16.167.22880TCP
              2025-01-14T21:16:15.612802+010020242991A Network Trojan was detected192.168.2.749702104.16.167.22880TCP
              2025-01-14T21:16:16.886897+010020242991A Network Trojan was detected192.168.2.749719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.631833+010020243011A Network Trojan was detected192.168.2.749701104.16.167.22880TCP
              2025-01-14T21:16:15.612802+010020243011A Network Trojan was detected192.168.2.749702104.16.167.22880TCP
              2025-01-14T21:16:16.886897+010020243011A Network Trojan was detected192.168.2.749719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.631833+010020243021A Network Trojan was detected192.168.2.749701104.16.167.22880TCP
              2025-01-14T21:16:15.612802+010020243021A Network Trojan was detected192.168.2.749702104.16.167.22880TCP
              2025-01-14T21:16:16.886897+010020243021A Network Trojan was detected192.168.2.749719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:16:14.631833+010028033043Unknown Traffic192.168.2.749701104.16.167.22880TCP
              2025-01-14T21:16:15.612802+010028033043Unknown Traffic192.168.2.749702104.16.167.22880TCP
              2025-01-14T21:16:16.886897+010028033043Unknown Traffic192.168.2.749719104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: hsmSW6Eifl.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 92%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 92%
              Source: hsmSW6Eifl.dllVirustotal: Detection: 91%Perma Link
              Source: hsmSW6Eifl.dllReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: hsmSW6Eifl.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 10_2_004018B9 CryptReleaseContext,10_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: hsmSW6Eifl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49701 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49702 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49701 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49701 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49701 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49702 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49702 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49702 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:16:14 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204d7aff4b8cee-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:16:15 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204d812d4e2361-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:16:16 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204d891f057d16-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.7:56755 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49701 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49702 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49719
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49701
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49702
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.192
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.192
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.192
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.192
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 43.2.130.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.80
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.80
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.80
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.80
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 142.87.184.1
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.253
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.253
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.253
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.253
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 99.127.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 78.108.125.185
              Source: unknownTCP traffic detected without corresponding DNS query: 78.108.125.185
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: time.windows.com
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: hsmSW6Eifl.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CFB000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000006.00000002.1335170907.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/L
              Source: mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/T
              Source: mssecsvc.exe, 00000006.00000002.1335170907.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/h
              Source: mssecsvc.exe, 00000006.00000002.1335170907.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/k
              Source: mssecsvc.exe, 00000009.00000003.1332971487.0000000000C30000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1975203394.0000000000C1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/o
              Source: mssecsvc.exe, 00000009.00000002.1975203394.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com=r
              Source: mssecsvc.exe, 00000006.00000002.1335170907.0000000000BAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comG
              Source: mssecsvc.exe, 00000009.00000002.1970636196.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000009.00000002.1975203394.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comll
              Source: mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.coms
              Source: mssecsvc.exe, 00000006.00000002.1335170907.0000000000C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!10_2_004014A6
              Source: Yara matchFile source: hsmSW6Eifl.dll, type: SAMPLE
              Source: Yara matchFile source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.23d28c8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.1eb30a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.1eb7104.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.23dd8e8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.23e1948.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1323343347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.1337997356.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1308374929.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1347227262.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1323602244.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1976173358.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.1338244640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1347387179.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1975743881.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1308531572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7644, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7936, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: hsmSW6Eifl.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: hsmSW6Eifl.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.23d28c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1ea8084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.23d28c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.23d28c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.1eb30a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1eb30a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.1eb7104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.1eb7104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.23dd8e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.23dd8e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.23e1948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.23e1948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.1333622807.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000D.00000002.1346779769.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000D.00000000.1346407131.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1323602244.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1976173358.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000000.1338244640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000002.1347387179.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1975743881.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1308531572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 10_2_00406C4010_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 10_2_00402A7610_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 10_2_00402E7E10_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040350F10_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 10_2_00404C1910_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040541F10_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040379710_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 10_2_004043B710_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 10_2_004031BC10_2_004031BC
              Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 06A24B8386DFFF1FA844846AAFD8D9C5FDA5C5687A84A3B53FFAF62D995498E3
              Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 06A24B8386DFFF1FA844846AAFD8D9C5FDA5C5687A84A3B53FFAF62D995498E3
              Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: hsmSW6Eifl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: hsmSW6Eifl.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: hsmSW6Eifl.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.23d28c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1ea8084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.1eda128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.240496c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.1eb7104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.23e1948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.240496c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.1eda128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 13.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.23d28c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.23d28c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.1ea8084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.1eb30a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1eb30a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.1eb7104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.1eb7104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.23dd8e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.23dd8e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 13.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.23e1948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.23e1948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.1333622807.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000D.00000002.1346779769.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000D.00000000.1346407131.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1323602244.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1976173358.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000000.1338244640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000002.1347387179.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1975743881.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1308531572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000D.00000002.1346779769.000000000040E000.00000008.00000001.01000000.00000007.sdmp, hsmSW6Eifl.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@21/2@2/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,10_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 9_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,9_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03
              Source: hsmSW6Eifl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\hsmSW6Eifl.dll,PlayGame
              Source: hsmSW6Eifl.dllVirustotal: Detection: 91%
              Source: hsmSW6Eifl.dllReversingLabs: Detection: 94%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\hsmSW6Eifl.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\hsmSW6Eifl.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: hsmSW6Eifl.dllStatic file information: File size 5267459 > 1048576
              Source: hsmSW6Eifl.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 10_2_00407710 push eax; ret 10_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 10_2_004076C8 push eax; ret 10_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7852Thread sleep count: 94 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7852Thread sleep time: -188000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7856Thread sleep count: 128 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7856Thread sleep count: 43 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7852Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 0000000C.00000002.1347801865.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWNo
              Source: mssecsvc.exe, 00000006.00000002.1335170907.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1335170907.0000000000C16000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1975203394.0000000000C39000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1975203394.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000003.1332971487.0000000000C39000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1347801865.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: svchost.exe, 00000008.00000002.2554462754.000001E612C31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 10_2_004029CC free,GetProcessHeap,HeapFree,10_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1Jump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591286 Sample: hsmSW6Eifl.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 45 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->45 47 time.windows.com 2->47 55 Tries to download HTTP data from a sinkholed server 2->55 57 Suricata IDS alerts for network traffic 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 6 other signatures 2->61 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        16 svchost.exe 2->16         started        signatures3 process4 dnsIp5 18 cmd.exe 1 10->18         started        20 rundll32.exe 10->20         started        23 conhost.exe 10->23         started        25 rundll32.exe 1 10->25         started        49 192.168.2.102 unknown unknown 12->49 51 192.168.2.103 unknown unknown 12->51 53 98 other IPs or domains 12->53 73 Connects to many different private IPs via SMB (likely to spread or exploit) 12->73 75 Connects to many different private IPs (likely to spread or exploit) 12->75 signatures6 process7 signatures8 27 rundll32.exe 18->27         started        63 Drops executables to the windows directory (C:\Windows) and starts them 20->63 29 mssecsvc.exe 7 20->29         started        process9 file10 33 mssecsvc.exe 7 27->33         started        43 C:\WINDOWS\qeriuwjhrf (copy), PE32 29->43 dropped 77 Drops executables to the windows directory (C:\Windows) and starts them 29->77 36 tasksche.exe 29->36         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 33->41 dropped 38 tasksche.exe 33->38         started        process14 signatures15 65 Detected Wannacry Ransomware 38->65 67 Antivirus detection for dropped file 38->67 69 Multi AV Scanner detection for dropped file 38->69 71 Machine Learning detection for dropped file 38->71

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              hsmSW6Eifl.dll92%VirustotalBrowse
              hsmSW6Eifl.dll95%ReversingLabsWin32.Ransomware.WannaCry
              hsmSW6Eifl.dll100%AviraTR/AD.WannaCry.qebhm
              hsmSW6Eifl.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com=r0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.coms0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comG0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
              https://www.kryptoslogic.com0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comll0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                time.windows.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comhsmSW6Eifl.dllfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/omssecsvc.exe, 00000009.00000003.1332971487.0000000000C30000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1975203394.0000000000C1C000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comllmssecsvc.exe, 00000009.00000002.1975203394.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Lmssecsvc.exe, 00000006.00000002.1335170907.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comsmssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/kmssecsvc.exe, 00000006.00000002.1335170907.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hmssecsvc.exe, 00000006.00000002.1335170907.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com=rmssecsvc.exe, 00000009.00000002.1975203394.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.kryptoslogic.commssecsvc.exe, 00000006.00000002.1335170907.0000000000C16000.00000004.00000020.00020000.00000000.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGmssecsvc.exe, 00000006.00000002.1335170907.0000000000BAE000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Tmssecsvc.exe, 0000000C.00000002.1347801865.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000009.00000002.1970636196.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                217.178.18.169
                                unknownJapan55391MF-NATIVE6-EINTERNETMULTIFEEDCOJPfalse
                                34.1.98.3
                                unknownUnited States
                                2686ATGS-MMD-ASUSfalse
                                34.1.98.1
                                unknownUnited States
                                2686ATGS-MMD-ASUSfalse
                                193.95.220.19
                                unknownSlovenia
                                5603SIOL-NETTelekomSlovenijeddSIfalse
                                203.35.95.139
                                unknownAustralia
                                1221ASN-TELSTRATelstraCorporationLtdAUfalse
                                152.120.88.1
                                unknownUnited States
                                2576DOT-ASUSfalse
                                165.200.102.247
                                unknownUnited States
                                22809AMFAM-INSUSfalse
                                6.45.217.2
                                unknownUnited States
                                3356LEVEL3USfalse
                                6.45.217.1
                                unknownUnited States
                                3356LEVEL3USfalse
                                43.2.130.1
                                unknownJapan4249LILLY-ASUSfalse
                                43.2.130.2
                                unknownJapan4249LILLY-ASUSfalse
                                8.157.48.1
                                unknownSingapore
                                37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                178.7.0.211
                                unknownGermany
                                3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                115.209.51.1
                                unknownChina
                                4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                115.209.51.2
                                unknownChina
                                4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                115.209.51.51
                                unknownChina
                                4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                138.51.125.1
                                unknownCanada
                                239UTORONTO-ASCAfalse
                                148.159.167.138
                                unknownUnited States
                                13860LFGUSfalse
                                63.93.143.167
                                unknownUnited States
                                701UUNETUSfalse
                                138.51.125.63
                                unknownCanada
                                239UTORONTO-ASCAfalse
                                142.87.184.2
                                unknownCanada
                                7950HC-ASCAfalse
                                142.87.184.1
                                unknownCanada
                                7950HC-ASCAfalse
                                43.2.130.192
                                unknownJapan4249LILLY-ASUSfalse
                                71.37.178.1
                                unknownUnited States
                                209CENTURYLINK-US-LEGACY-QWESTUSfalse
                                172.142.199.1
                                unknownUnited States
                                7018ATT-INTERNET4USfalse
                                148.159.167.1
                                unknownUnited States
                                13860LFGUSfalse
                                112.94.83.130
                                unknownChina
                                17622CNCGROUP-GZChinaUnicomGuangzhounetworkCNfalse
                                IP
                                192.168.2.148
                                192.168.2.149
                                192.168.2.146
                                192.168.2.147
                                192.168.2.140
                                192.168.2.141
                                192.168.2.144
                                192.168.2.145
                                192.168.2.142
                                192.168.2.143
                                192.168.2.159
                                192.168.2.157
                                192.168.2.158
                                192.168.2.151
                                192.168.2.152
                                192.168.2.150
                                192.168.2.155
                                192.168.2.156
                                192.168.2.153
                                192.168.2.154
                                192.168.2.126
                                192.168.2.247
                                192.168.2.127
                                192.168.2.248
                                192.168.2.124
                                192.168.2.245
                                192.168.2.125
                                192.168.2.246
                                192.168.2.128
                                192.168.2.249
                                192.168.2.129
                                192.168.2.240
                                192.168.2.122
                                192.168.2.243
                                192.168.2.123
                                192.168.2.244
                                192.168.2.120
                                192.168.2.241
                                192.168.2.121
                                192.168.2.242
                                192.168.2.97
                                192.168.2.137
                                192.168.2.96
                                192.168.2.138
                                192.168.2.99
                                192.168.2.135
                                192.168.2.98
                                192.168.2.136
                                192.168.2.139
                                192.168.2.250
                                192.168.2.130
                                192.168.2.251
                                192.168.2.91
                                192.168.2.90
                                192.168.2.93
                                192.168.2.133
                                192.168.2.254
                                192.168.2.92
                                192.168.2.134
                                192.168.2.95
                                192.168.2.131
                                192.168.2.252
                                192.168.2.94
                                192.168.2.132
                                192.168.2.253
                                192.168.2.104
                                192.168.2.225
                                192.168.2.105
                                192.168.2.226
                                192.168.2.102
                                192.168.2.223
                                192.168.2.103
                                192.168.2.224
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1591286
                                Start date and time:2025-01-14 21:15:11 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 39s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:18
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:hsmSW6Eifl.dll
                                renamed because original name is a hash value
                                Original Sample Name:74bc261ad11bc9f1d57641998dc1fe69.dll
                                Detection:MAL
                                Classification:mal100.rans.expl.evad.winDLL@21/2@2/100
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:Failed
                                Cookbook Comments:
                                • Found application associated with file extension: .dll
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 51.145.123.29, 199.232.214.172, 13.107.246.45, 20.12.23.50
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target tasksche.exe, PID 7880 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                15:16:15API Interceptor1x Sleep call for process: loaddll32.exe modified
                                15:16:49API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comYx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                • 104.16.166.228
                                9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                • 104.16.166.228
                                k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                • 104.16.166.228
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                • 104.16.166.228
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                • 104.16.167.228
                                LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                ATGS-MMD-ASUSFjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
                                • 51.243.90.42
                                m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                • 34.177.88.1
                                5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                • 48.82.13.223
                                jpXNd6Kt8z.dllGet hashmaliciousWannacryBrowse
                                • 33.222.99.200
                                527.zipGet hashmaliciousUnknownBrowse
                                • 34.160.144.191
                                527.zipGet hashmaliciousUnknownBrowse
                                • 34.160.144.191
                                Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                • 34.43.158.177
                                https://drive.google.com/file/d/1TF-huc4s6nOnHpT977ywO8Fj-NERebnm/view?usp=sharing_eip&ts=6786926eGet hashmaliciousUnknownBrowse
                                • 57.150.27.161
                                https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                • 57.128.187.108
                                meth8.elfGet hashmaliciousMiraiBrowse
                                • 51.173.200.112
                                MF-NATIVE6-EINTERNETMULTIFEEDCOJPla.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                • 217.178.196.148
                                na.elfGet hashmaliciousMiraiBrowse
                                • 217.178.196.177
                                buPdHWwrzF.elfGet hashmaliciousUnknownBrowse
                                • 217.178.18.236
                                jew.arm.elfGet hashmaliciousUnknownBrowse
                                • 217.178.131.100
                                LnZKeXeGBj.elfGet hashmaliciousMiraiBrowse
                                • 217.178.148.247
                                S38rWPStXV.elfGet hashmaliciousMiraiBrowse
                                • 217.178.236.208
                                skid.x86-20230704-0645.elfGet hashmaliciousMirai, MoobotBrowse
                                • 217.178.236.221
                                fl2Wn9c8yu.elfGet hashmaliciousMiraiBrowse
                                • 217.178.178.128
                                08MjqwvfUc.elfGet hashmaliciousMiraiBrowse
                                • 217.178.178.104
                                hK5p7izXDf.elfGet hashmaliciousUnknownBrowse
                                • 217.178.139.228
                                ATGS-MMD-ASUSm9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                • 34.177.88.1
                                5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                • 48.82.13.223
                                jpXNd6Kt8z.dllGet hashmaliciousWannacryBrowse
                                • 33.222.99.200
                                527.zipGet hashmaliciousUnknownBrowse
                                • 34.160.144.191
                                527.zipGet hashmaliciousUnknownBrowse
                                • 34.160.144.191
                                Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                • 34.43.158.177
                                https://drive.google.com/file/d/1TF-huc4s6nOnHpT977ywO8Fj-NERebnm/view?usp=sharing_eip&ts=6786926eGet hashmaliciousUnknownBrowse
                                • 57.150.27.161
                                https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                • 57.128.187.108
                                meth8.elfGet hashmaliciousMiraiBrowse
                                • 51.173.200.112
                                meth1.elfGet hashmaliciousMiraiBrowse
                                • 51.73.248.209
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Windows\tasksche.exeiG9dc9vCjP.dllGet hashmaliciousWannacryBrowse
                                  C:\WINDOWS\qeriuwjhrf (copy)iG9dc9vCjP.dllGet hashmaliciousWannacryBrowse
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):6.794569142818353
                                    Encrypted:false
                                    SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEc:QqPoBhz1aRxcSUDk36SAEdhvxWa9P5
                                    MD5:A089E2E733A58751CAB58BA261ACC543
                                    SHA1:5DFEB7E02D81BF5EB545C8993E49D48853AB30A9
                                    SHA-256:06A24B8386DFFF1FA844846AAFD8D9C5FDA5C5687A84A3B53FFAF62D995498E3
                                    SHA-512:C5D924B45790F4687FDDAF5BBB44200FD10D4016CC482CC9ABFF00F3EF725D6155F95A7934C81178BB5DDE82CE8AF93A2540CEDFDA0D7B3D7D90DCE242268CB7
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 93%
                                    Joe Sandbox View:
                                    • Filename: iG9dc9vCjP.dll, Detection: malicious, Browse
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):6.794569142818353
                                    Encrypted:false
                                    SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEc:QqPoBhz1aRxcSUDk36SAEdhvxWa9P5
                                    MD5:A089E2E733A58751CAB58BA261ACC543
                                    SHA1:5DFEB7E02D81BF5EB545C8993E49D48853AB30A9
                                    SHA-256:06A24B8386DFFF1FA844846AAFD8D9C5FDA5C5687A84A3B53FFAF62D995498E3
                                    SHA-512:C5D924B45790F4687FDDAF5BBB44200FD10D4016CC482CC9ABFF00F3EF725D6155F95A7934C81178BB5DDE82CE8AF93A2540CEDFDA0D7B3D7D90DCE242268CB7
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 93%
                                    Joe Sandbox View:
                                    • Filename: iG9dc9vCjP.dll, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):5.216991246440046
                                    TrID:
                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                    • DOS Executable Generic (2002/1) 0.20%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:hsmSW6Eifl.dll
                                    File size:5'267'459 bytes
                                    MD5:74bc261ad11bc9f1d57641998dc1fe69
                                    SHA1:4ad5ed670cc99370808f3c211ef15b7672e6b4c9
                                    SHA256:8b04901e2af43dc45cf1a8912849c51f340c308159644fbc31cb58c8478e3faa
                                    SHA512:1ecb9b5883643eeabfe07c6f6d82324c14addb27ee625542340e7a34c7eebc7fe45eefe70319352992bff0455bf373ffad6d78592618651f3b7a78a8ea437127
                                    SSDEEP:49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEc:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5
                                    TLSH:F936336CB23CD6FCD10519B44463CA66A7733C6566FE6A0F8F4089671D03B6ABBD0B42
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                    Icon Hash:7ae282899bbab082
                                    Entrypoint:0x100011e9
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x10000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                    DLL Characteristics:
                                    Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    push ebx
                                    mov ebx, dword ptr [ebp+08h]
                                    push esi
                                    mov esi, dword ptr [ebp+0Ch]
                                    push edi
                                    mov edi, dword ptr [ebp+10h]
                                    test esi, esi
                                    jne 00007FA35D1C682Bh
                                    cmp dword ptr [10003140h], 00000000h
                                    jmp 00007FA35D1C6848h
                                    cmp esi, 01h
                                    je 00007FA35D1C6827h
                                    cmp esi, 02h
                                    jne 00007FA35D1C6844h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007FA35D1C682Bh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    test eax, eax
                                    je 00007FA35D1C682Eh
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FA35D1C673Ah
                                    test eax, eax
                                    jne 00007FA35D1C6826h
                                    xor eax, eax
                                    jmp 00007FA35D1C6870h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FA35D1C65ECh
                                    cmp esi, 01h
                                    mov dword ptr [ebp+0Ch], eax
                                    jne 00007FA35D1C682Eh
                                    test eax, eax
                                    jne 00007FA35D1C6859h
                                    push edi
                                    push eax
                                    push ebx
                                    call 00007FA35D1C6716h
                                    test esi, esi
                                    je 00007FA35D1C6827h
                                    cmp esi, 03h
                                    jne 00007FA35D1C6848h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FA35D1C6705h
                                    test eax, eax
                                    jne 00007FA35D1C6825h
                                    and dword ptr [ebp+0Ch], eax
                                    cmp dword ptr [ebp+0Ch], 00000000h
                                    je 00007FA35D1C6833h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007FA35D1C682Ah
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    mov dword ptr [ebp+0Ch], eax
                                    mov eax, dword ptr [ebp+0Ch]
                                    pop edi
                                    pop esi
                                    pop ebx
                                    pop ebp
                                    retn 000Ch
                                    jmp dword ptr [10002028h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    Programming Language:
                                    • [ C ] VS98 (6.0) build 8168
                                    • [C++] VS98 (6.0) build 8168
                                    • [RES] VS98 (6.0) cvtres build 1720
                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x40000x5000600x50100019cf7bc2e2416bb3711bb8e16b3f93bfunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    W0x40600x500000dataEnglishUnited States0.8770942687988281
                                    DLLImport
                                    KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                    MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                    NameOrdinalAddress
                                    PlayGame10x10001114
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-14T21:16:14.088455+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.7567551.1.1.153UDP
                                    2025-01-14T21:16:14.631833+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749701104.16.167.22880TCP
                                    2025-01-14T21:16:14.631833+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749701104.16.167.22880TCP
                                    2025-01-14T21:16:14.631833+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749701104.16.167.22880TCP
                                    2025-01-14T21:16:14.631833+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749701104.16.167.22880TCP
                                    2025-01-14T21:16:14.631833+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749701104.16.167.22880TCP
                                    2025-01-14T21:16:14.665911+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749701TCP
                                    2025-01-14T21:16:15.612802+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749702104.16.167.22880TCP
                                    2025-01-14T21:16:15.612802+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749702104.16.167.22880TCP
                                    2025-01-14T21:16:15.612802+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749702104.16.167.22880TCP
                                    2025-01-14T21:16:15.612802+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749702104.16.167.22880TCP
                                    2025-01-14T21:16:15.612802+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749702104.16.167.22880TCP
                                    2025-01-14T21:16:15.613062+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749702TCP
                                    2025-01-14T21:16:16.886897+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749719104.16.167.22880TCP
                                    2025-01-14T21:16:16.886897+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749719104.16.167.22880TCP
                                    2025-01-14T21:16:16.886897+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749719104.16.167.22880TCP
                                    2025-01-14T21:16:16.886897+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749719104.16.167.22880TCP
                                    2025-01-14T21:16:16.886897+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749719104.16.167.22880TCP
                                    2025-01-14T21:16:16.886924+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749719TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 21:16:08.816406965 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:09.200653076 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:09.591340065 CET49671443192.168.2.7204.79.197.203
                                    Jan 14, 2025 21:16:09.763086081 CET49674443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:09.763159990 CET49675443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:09.903745890 CET49672443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:09.950618982 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:11.450592041 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:14.129215956 CET4970180192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:14.134179115 CET8049701104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:14.138192892 CET4970180192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:14.144634008 CET4970180192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:14.149436951 CET8049701104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:14.434984922 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:14.631414890 CET8049701104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:14.631726980 CET8049701104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:14.631833076 CET4970180192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:14.660979986 CET4970180192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:14.665910959 CET8049701104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:15.102766991 CET4970280192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:15.107611895 CET8049702104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:15.107738018 CET4970280192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:15.107870102 CET4970280192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:15.112636089 CET8049702104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:15.612737894 CET8049702104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:15.612802029 CET4970280192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:15.612885952 CET4970280192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:15.613061905 CET8049702104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:15.613102913 CET4970280192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:15.617625952 CET8049702104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:15.669183016 CET49703445192.168.2.743.2.130.192
                                    Jan 14, 2025 21:16:15.674046040 CET4454970343.2.130.192192.168.2.7
                                    Jan 14, 2025 21:16:15.674155951 CET49703445192.168.2.743.2.130.192
                                    Jan 14, 2025 21:16:15.674175024 CET49703445192.168.2.743.2.130.192
                                    Jan 14, 2025 21:16:15.674360037 CET49704445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.679141998 CET4454970443.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:15.679198980 CET49704445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.679236889 CET49704445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.679594994 CET4454970343.2.130.192192.168.2.7
                                    Jan 14, 2025 21:16:15.679698944 CET49703445192.168.2.743.2.130.192
                                    Jan 14, 2025 21:16:15.684317112 CET4454970443.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:15.684364080 CET49704445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.692140102 CET49705445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.697002888 CET4454970543.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:15.697069883 CET49705445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.697140932 CET49705445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:15.701901913 CET4454970543.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:16.402120113 CET4971980192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:16.407008886 CET8049719104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:16.407269955 CET4971980192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:16.407429934 CET4971980192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:16.412249088 CET8049719104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:16.886672974 CET8049719104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:16.886897087 CET4971980192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:16.886897087 CET4971980192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:16.886924028 CET8049719104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:16.888118029 CET4971980192.168.2.7104.16.167.228
                                    Jan 14, 2025 21:16:16.891735077 CET8049719104.16.167.228192.168.2.7
                                    Jan 14, 2025 21:16:17.673105955 CET49730445192.168.2.7142.87.184.80
                                    Jan 14, 2025 21:16:17.678045988 CET44549730142.87.184.80192.168.2.7
                                    Jan 14, 2025 21:16:17.678178072 CET49730445192.168.2.7142.87.184.80
                                    Jan 14, 2025 21:16:17.678252935 CET49730445192.168.2.7142.87.184.80
                                    Jan 14, 2025 21:16:17.678395987 CET49731445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.683231115 CET44549731142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:17.683310986 CET49731445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.683415890 CET49731445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.683459997 CET44549730142.87.184.80192.168.2.7
                                    Jan 14, 2025 21:16:17.683562994 CET49730445192.168.2.7142.87.184.80
                                    Jan 14, 2025 21:16:17.684892893 CET49732445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.688282013 CET44549731142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:17.688352108 CET49731445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.689696074 CET44549732142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:17.689759970 CET49732445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.689937115 CET49732445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:17.694751978 CET44549732142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:19.200658083 CET49671443192.168.2.7204.79.197.203
                                    Jan 14, 2025 21:16:19.372503996 CET49675443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:19.372585058 CET49674443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:19.513139009 CET49672443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:19.686800957 CET49764445192.168.2.796.124.10.49
                                    Jan 14, 2025 21:16:19.691715002 CET4454976496.124.10.49192.168.2.7
                                    Jan 14, 2025 21:16:19.691858053 CET49764445192.168.2.796.124.10.49
                                    Jan 14, 2025 21:16:19.691858053 CET49764445192.168.2.796.124.10.49
                                    Jan 14, 2025 21:16:19.692095995 CET49765445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.699389935 CET4454976596.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:19.699420929 CET4454976496.124.10.49192.168.2.7
                                    Jan 14, 2025 21:16:19.699493885 CET49765445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.699493885 CET49765445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.699661970 CET49764445192.168.2.796.124.10.49
                                    Jan 14, 2025 21:16:19.700670004 CET49766445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.705149889 CET4454976596.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:19.705214024 CET49765445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.705611944 CET4454976696.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:19.705689907 CET49766445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.705744028 CET49766445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:19.710552931 CET4454976696.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:20.388120890 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:21.702064991 CET49804445192.168.2.799.127.218.253
                                    Jan 14, 2025 21:16:21.707190990 CET4454980499.127.218.253192.168.2.7
                                    Jan 14, 2025 21:16:21.707360983 CET49804445192.168.2.799.127.218.253
                                    Jan 14, 2025 21:16:21.707418919 CET49804445192.168.2.799.127.218.253
                                    Jan 14, 2025 21:16:21.707638025 CET49805445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.712409973 CET4454980599.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:21.712471962 CET49805445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.712495089 CET49805445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.712594032 CET4454980499.127.218.253192.168.2.7
                                    Jan 14, 2025 21:16:21.712647915 CET49804445192.168.2.799.127.218.253
                                    Jan 14, 2025 21:16:21.713653088 CET49806445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.717531919 CET4454980599.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:21.717581987 CET49805445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.718415022 CET4454980699.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:21.718480110 CET49806445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.718533993 CET49806445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:21.723277092 CET4454980699.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:21.939357042 CET44349700104.98.116.138192.168.2.7
                                    Jan 14, 2025 21:16:21.939599037 CET49700443192.168.2.7104.98.116.138
                                    Jan 14, 2025 21:16:23.718628883 CET49837445192.168.2.778.108.125.185
                                    Jan 14, 2025 21:16:23.723526955 CET4454983778.108.125.185192.168.2.7
                                    Jan 14, 2025 21:16:23.723608971 CET49837445192.168.2.778.108.125.185
                                    Jan 14, 2025 21:16:23.723717928 CET49837445192.168.2.778.108.125.185
                                    Jan 14, 2025 21:16:23.724004984 CET49838445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.728741884 CET4454983778.108.125.185192.168.2.7
                                    Jan 14, 2025 21:16:23.728801012 CET49837445192.168.2.778.108.125.185
                                    Jan 14, 2025 21:16:23.728847027 CET4454983878.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:23.728919983 CET49838445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.728967905 CET49838445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.730648994 CET49839445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.734011889 CET4454983878.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:23.734076977 CET49838445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.735516071 CET4454983978.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:23.735579014 CET49839445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.735644102 CET49839445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:23.740386963 CET4454983978.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:25.756520987 CET49877445192.168.2.719.176.243.93
                                    Jan 14, 2025 21:16:25.761492014 CET4454987719.176.243.93192.168.2.7
                                    Jan 14, 2025 21:16:25.761569977 CET49877445192.168.2.719.176.243.93
                                    Jan 14, 2025 21:16:25.761630058 CET49877445192.168.2.719.176.243.93
                                    Jan 14, 2025 21:16:25.761873960 CET49878445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.766700029 CET4454987819.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:25.766748905 CET4454987719.176.243.93192.168.2.7
                                    Jan 14, 2025 21:16:25.766788960 CET49878445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.766804934 CET49877445192.168.2.719.176.243.93
                                    Jan 14, 2025 21:16:25.767149925 CET49878445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.772018909 CET4454987819.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:25.772093058 CET49878445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.774348021 CET49879445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.779227972 CET4454987919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:25.779297113 CET49879445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.780668020 CET49879445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:25.785507917 CET4454987919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:27.777789116 CET49910445192.168.2.76.45.217.65
                                    Jan 14, 2025 21:16:27.782663107 CET445499106.45.217.65192.168.2.7
                                    Jan 14, 2025 21:16:27.784427881 CET49910445192.168.2.76.45.217.65
                                    Jan 14, 2025 21:16:27.784526110 CET49910445192.168.2.76.45.217.65
                                    Jan 14, 2025 21:16:27.784742117 CET49911445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.789589882 CET445499116.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:27.789603949 CET445499106.45.217.65192.168.2.7
                                    Jan 14, 2025 21:16:27.789674997 CET49911445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.789680958 CET49910445192.168.2.76.45.217.65
                                    Jan 14, 2025 21:16:27.789738894 CET49911445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.794317007 CET49912445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.794815063 CET445499116.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:27.794893980 CET49911445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.799128056 CET445499126.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:27.799714088 CET49912445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.814534903 CET49912445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:27.819427967 CET445499126.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:29.779269934 CET49945445192.168.2.7203.35.95.139
                                    Jan 14, 2025 21:16:29.784099102 CET44549945203.35.95.139192.168.2.7
                                    Jan 14, 2025 21:16:29.784181118 CET49945445192.168.2.7203.35.95.139
                                    Jan 14, 2025 21:16:29.784264088 CET49945445192.168.2.7203.35.95.139
                                    Jan 14, 2025 21:16:29.784404993 CET49946445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.789149046 CET44549945203.35.95.139192.168.2.7
                                    Jan 14, 2025 21:16:29.789186954 CET44549946203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:29.789213896 CET49945445192.168.2.7203.35.95.139
                                    Jan 14, 2025 21:16:29.789271116 CET49946445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.789329052 CET49946445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.789572001 CET49947445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.794168949 CET44549946203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:29.794210911 CET49946445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.794460058 CET44549947203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:29.794537067 CET49947445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.794583082 CET49947445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:29.799385071 CET44549947203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:31.799786091 CET49983445192.168.2.7115.209.51.51
                                    Jan 14, 2025 21:16:31.804760933 CET44549983115.209.51.51192.168.2.7
                                    Jan 14, 2025 21:16:31.804822922 CET49983445192.168.2.7115.209.51.51
                                    Jan 14, 2025 21:16:31.804902077 CET49983445192.168.2.7115.209.51.51
                                    Jan 14, 2025 21:16:31.805224895 CET49984445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.809943914 CET44549983115.209.51.51192.168.2.7
                                    Jan 14, 2025 21:16:31.809994936 CET49983445192.168.2.7115.209.51.51
                                    Jan 14, 2025 21:16:31.810089111 CET44549984115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:31.810146093 CET49984445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.810276031 CET49984445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.811484098 CET49985445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.815220118 CET44549984115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:31.815263987 CET49984445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.816315889 CET44549985115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:31.816384077 CET49985445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.816416025 CET49985445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:31.821242094 CET44549985115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:32.294450998 CET49677443192.168.2.720.50.201.200
                                    Jan 14, 2025 21:16:33.810420036 CET50021445192.168.2.7175.113.195.9
                                    Jan 14, 2025 21:16:33.815284967 CET44550021175.113.195.9192.168.2.7
                                    Jan 14, 2025 21:16:33.815423965 CET50021445192.168.2.7175.113.195.9
                                    Jan 14, 2025 21:16:33.815423965 CET50021445192.168.2.7175.113.195.9
                                    Jan 14, 2025 21:16:33.815534115 CET50022445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.821336985 CET44550021175.113.195.9192.168.2.7
                                    Jan 14, 2025 21:16:33.821352959 CET44550022175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:33.821362019 CET44550021175.113.195.9192.168.2.7
                                    Jan 14, 2025 21:16:33.821407080 CET50022445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.821455002 CET50022445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.821468115 CET50021445192.168.2.7175.113.195.9
                                    Jan 14, 2025 21:16:33.821774006 CET50024445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.826787949 CET44550022175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:33.826853037 CET50022445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.826896906 CET44550024175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:33.826956034 CET50024445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.826978922 CET50024445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:33.831865072 CET44550024175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:35.826617956 CET50056445192.168.2.7152.120.88.157
                                    Jan 14, 2025 21:16:35.831453085 CET44550056152.120.88.157192.168.2.7
                                    Jan 14, 2025 21:16:35.831648111 CET50056445192.168.2.7152.120.88.157
                                    Jan 14, 2025 21:16:35.831799984 CET50056445192.168.2.7152.120.88.157
                                    Jan 14, 2025 21:16:35.831964016 CET50057445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.836699009 CET44550056152.120.88.157192.168.2.7
                                    Jan 14, 2025 21:16:35.836759090 CET44550057152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:35.836766958 CET50056445192.168.2.7152.120.88.157
                                    Jan 14, 2025 21:16:35.836821079 CET50057445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.836852074 CET50057445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.837129116 CET50058445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.841823101 CET44550057152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:35.841878891 CET50057445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.841892958 CET44550058152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:35.841954947 CET50058445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.841983080 CET50058445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:35.846705914 CET44550058152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:37.080889940 CET4454970543.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:37.081123114 CET49705445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:37.081123114 CET49705445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:37.081123114 CET49705445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:37.086020947 CET4454970543.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:37.086035013 CET4454970543.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:37.842099905 CET50090445192.168.2.720.92.128.83
                                    Jan 14, 2025 21:16:37.847023010 CET4455009020.92.128.83192.168.2.7
                                    Jan 14, 2025 21:16:37.847105980 CET50090445192.168.2.720.92.128.83
                                    Jan 14, 2025 21:16:37.847383976 CET50090445192.168.2.720.92.128.83
                                    Jan 14, 2025 21:16:37.847549915 CET50091445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.852231979 CET4455009020.92.128.83192.168.2.7
                                    Jan 14, 2025 21:16:37.852313042 CET50090445192.168.2.720.92.128.83
                                    Jan 14, 2025 21:16:37.852319956 CET4455009120.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:37.852521896 CET50091445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.852574110 CET50091445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.852890015 CET50092445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.857506990 CET4455009120.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:37.857578039 CET50091445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.857734919 CET4455009220.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:37.857794046 CET50092445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.857981920 CET50092445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:37.862726927 CET4455009220.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:39.066535950 CET44549732142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:39.067044020 CET49732445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:39.098165035 CET49732445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:39.098186016 CET49732445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:39.103044987 CET44549732142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:39.103064060 CET44549732142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:39.857691050 CET50125445192.168.2.71.183.9.70
                                    Jan 14, 2025 21:16:39.862562895 CET445501251.183.9.70192.168.2.7
                                    Jan 14, 2025 21:16:39.862714052 CET50125445192.168.2.71.183.9.70
                                    Jan 14, 2025 21:16:39.862799883 CET50125445192.168.2.71.183.9.70
                                    Jan 14, 2025 21:16:39.862948895 CET50126445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.867672920 CET445501251.183.9.70192.168.2.7
                                    Jan 14, 2025 21:16:39.867765903 CET50125445192.168.2.71.183.9.70
                                    Jan 14, 2025 21:16:39.867765903 CET445501261.183.9.1192.168.2.7
                                    Jan 14, 2025 21:16:39.867826939 CET50126445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.867867947 CET50126445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.868189096 CET50127445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.872764111 CET445501261.183.9.1192.168.2.7
                                    Jan 14, 2025 21:16:39.872814894 CET50126445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.872951031 CET445501271.183.9.1192.168.2.7
                                    Jan 14, 2025 21:16:39.873011112 CET50127445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.873040915 CET50127445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:16:39.877854109 CET445501271.183.9.1192.168.2.7
                                    Jan 14, 2025 21:16:40.091679096 CET50132445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:40.096522093 CET4455013243.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:40.096621990 CET50132445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:40.096714020 CET50132445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:16:40.101505041 CET4455013243.2.130.1192.168.2.7
                                    Jan 14, 2025 21:16:41.127753019 CET4454976696.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:41.127852917 CET49766445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:41.127895117 CET49766445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:41.127954006 CET49766445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:41.132664919 CET4454976696.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:41.132708073 CET4454976696.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:41.873670101 CET50150445192.168.2.734.1.98.3
                                    Jan 14, 2025 21:16:41.878544092 CET4455015034.1.98.3192.168.2.7
                                    Jan 14, 2025 21:16:41.878622055 CET50150445192.168.2.734.1.98.3
                                    Jan 14, 2025 21:16:41.878725052 CET50150445192.168.2.734.1.98.3
                                    Jan 14, 2025 21:16:41.878871918 CET50151445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.883668900 CET4455015034.1.98.3192.168.2.7
                                    Jan 14, 2025 21:16:41.883685112 CET4455015134.1.98.1192.168.2.7
                                    Jan 14, 2025 21:16:41.883743048 CET50150445192.168.2.734.1.98.3
                                    Jan 14, 2025 21:16:41.883801937 CET50151445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.883920908 CET50151445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.884195089 CET50153445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.888993025 CET4455015334.1.98.1192.168.2.7
                                    Jan 14, 2025 21:16:41.889077902 CET50153445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.889110088 CET50153445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.890192986 CET4455015134.1.98.1192.168.2.7
                                    Jan 14, 2025 21:16:41.890266895 CET50151445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:16:41.894108057 CET4455015334.1.98.1192.168.2.7
                                    Jan 14, 2025 21:16:42.107454062 CET50154445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:42.112591028 CET44550154142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:42.112729073 CET50154445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:42.112828970 CET50154445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:16:42.117629051 CET44550154142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:16:43.081530094 CET4454980699.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:43.081602097 CET49806445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:43.081648111 CET49806445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:43.081702948 CET49806445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:43.086978912 CET4454980699.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:43.087136030 CET4454980699.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:43.888885975 CET50166445192.168.2.7164.198.53.121
                                    Jan 14, 2025 21:16:43.893851995 CET44550166164.198.53.121192.168.2.7
                                    Jan 14, 2025 21:16:43.894026995 CET50166445192.168.2.7164.198.53.121
                                    Jan 14, 2025 21:16:43.894026995 CET50166445192.168.2.7164.198.53.121
                                    Jan 14, 2025 21:16:43.894208908 CET50167445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.899142981 CET44550167164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:16:43.899343014 CET50167445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.899362087 CET44550166164.198.53.121192.168.2.7
                                    Jan 14, 2025 21:16:43.899399996 CET50167445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.899739027 CET50166445192.168.2.7164.198.53.121
                                    Jan 14, 2025 21:16:43.899739027 CET50168445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.904282093 CET44550167164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:16:43.904337883 CET50167445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.904620886 CET44550168164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:16:43.904731035 CET50168445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.904731035 CET50168445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:16:43.909588099 CET44550168164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:16:44.138509989 CET50172445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:44.144114017 CET4455017296.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:44.144202948 CET50172445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:44.144237995 CET50172445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:16:44.149014950 CET4455017296.124.10.1192.168.2.7
                                    Jan 14, 2025 21:16:45.127341032 CET4454983978.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:45.127458096 CET49839445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:45.127501965 CET49839445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:45.127563000 CET49839445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:45.132488012 CET4454983978.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:45.132519007 CET4454983978.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:45.905004025 CET50184445192.168.2.7165.200.102.247
                                    Jan 14, 2025 21:16:45.909962893 CET44550184165.200.102.247192.168.2.7
                                    Jan 14, 2025 21:16:45.910159111 CET50184445192.168.2.7165.200.102.247
                                    Jan 14, 2025 21:16:45.910159111 CET50184445192.168.2.7165.200.102.247
                                    Jan 14, 2025 21:16:45.910360098 CET50185445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.915256023 CET44550184165.200.102.247192.168.2.7
                                    Jan 14, 2025 21:16:45.915292978 CET44550185165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:16:45.915338993 CET50184445192.168.2.7165.200.102.247
                                    Jan 14, 2025 21:16:45.915381908 CET50185445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.915467978 CET50185445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.915762901 CET50186445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.920341969 CET44550185165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:16:45.920655012 CET44550185165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:16:45.920686007 CET44550186165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:16:45.920731068 CET50185445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.920835972 CET50186445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.920855045 CET50186445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:16:45.925714970 CET44550186165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:16:46.091739893 CET50187445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:46.096627951 CET4455018799.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:46.096781969 CET50187445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:46.096808910 CET50187445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:16:46.101638079 CET4455018799.127.218.1192.168.2.7
                                    Jan 14, 2025 21:16:47.220752954 CET4454987919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:47.220840931 CET49879445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:47.220899105 CET49879445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:47.220968008 CET49879445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:47.225784063 CET4454987919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:47.225817919 CET4454987919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:47.919912100 CET50200445192.168.2.7138.51.125.63
                                    Jan 14, 2025 21:16:47.924773932 CET44550200138.51.125.63192.168.2.7
                                    Jan 14, 2025 21:16:47.924848080 CET50200445192.168.2.7138.51.125.63
                                    Jan 14, 2025 21:16:47.924967051 CET50200445192.168.2.7138.51.125.63
                                    Jan 14, 2025 21:16:47.925039053 CET50201445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.929864883 CET44550201138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:16:47.929940939 CET50201445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.929940939 CET50201445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.930157900 CET50202445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.930293083 CET44550200138.51.125.63192.168.2.7
                                    Jan 14, 2025 21:16:47.930342913 CET50200445192.168.2.7138.51.125.63
                                    Jan 14, 2025 21:16:47.935030937 CET44550201138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:16:47.935041904 CET44550202138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:16:47.935108900 CET50201445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.935112953 CET50202445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.935137033 CET50202445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:16:47.940120935 CET44550202138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:16:48.138627052 CET50205445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:48.143579006 CET4455020578.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:48.143719912 CET50205445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:48.143748999 CET50205445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:16:48.148544073 CET4455020578.108.125.1192.168.2.7
                                    Jan 14, 2025 21:16:49.189250946 CET445499126.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:49.189404011 CET49912445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:49.189510107 CET49912445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:49.189630032 CET49912445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:49.194269896 CET445499126.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:49.194422007 CET445499126.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:49.936722994 CET50214445192.168.2.7218.13.74.178
                                    Jan 14, 2025 21:16:49.941560984 CET44550214218.13.74.178192.168.2.7
                                    Jan 14, 2025 21:16:49.941654921 CET50214445192.168.2.7218.13.74.178
                                    Jan 14, 2025 21:16:49.946060896 CET50214445192.168.2.7218.13.74.178
                                    Jan 14, 2025 21:16:49.946238995 CET50215445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.950949907 CET44550214218.13.74.178192.168.2.7
                                    Jan 14, 2025 21:16:49.951015949 CET50214445192.168.2.7218.13.74.178
                                    Jan 14, 2025 21:16:49.951067924 CET44550215218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:16:49.951128006 CET50215445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.951186895 CET50215445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.951483011 CET50216445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.956079960 CET44550215218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:16:49.956176043 CET50215445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.956269979 CET44550216218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:16:49.956336021 CET50216445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.956367016 CET50216445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:16:49.961309910 CET44550216218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:16:50.232342005 CET50219445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:50.237376928 CET4455021919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:50.237454891 CET50219445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:50.237517118 CET50219445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:16:50.242259026 CET4455021919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:16:51.176093102 CET44549947203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:51.176155090 CET49947445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:51.176213026 CET49947445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:51.176260948 CET49947445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:51.181009054 CET44549947203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:51.181020021 CET44549947203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:51.810693026 CET50231445192.168.2.7148.159.167.138
                                    Jan 14, 2025 21:16:51.815658092 CET44550231148.159.167.138192.168.2.7
                                    Jan 14, 2025 21:16:51.815748930 CET50231445192.168.2.7148.159.167.138
                                    Jan 14, 2025 21:16:51.815882921 CET50231445192.168.2.7148.159.167.138
                                    Jan 14, 2025 21:16:51.815979004 CET50232445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.820772886 CET44550232148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:16:51.820849895 CET50232445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.820873022 CET44550231148.159.167.138192.168.2.7
                                    Jan 14, 2025 21:16:51.820920944 CET50231445192.168.2.7148.159.167.138
                                    Jan 14, 2025 21:16:51.820976019 CET50232445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.821252108 CET50233445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.825862885 CET44550232148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:16:51.825921059 CET50232445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.826091051 CET44550233148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:16:51.826162100 CET50233445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.826205015 CET50233445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:16:51.831069946 CET44550233148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:16:52.200973988 CET50235445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:52.205775976 CET445502356.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:52.205853939 CET50235445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:52.205883026 CET50235445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:16:52.210627079 CET445502356.45.217.1192.168.2.7
                                    Jan 14, 2025 21:16:53.242441893 CET44549985115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:53.242527008 CET49985445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:53.242563009 CET49985445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:53.242610931 CET49985445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:53.247467995 CET44549985115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:53.247487068 CET44549985115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:53.560684919 CET50246445192.168.2.75.139.24.93
                                    Jan 14, 2025 21:16:53.565494061 CET445502465.139.24.93192.168.2.7
                                    Jan 14, 2025 21:16:53.565560102 CET50246445192.168.2.75.139.24.93
                                    Jan 14, 2025 21:16:53.565649986 CET50246445192.168.2.75.139.24.93
                                    Jan 14, 2025 21:16:53.565821886 CET50247445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.570516109 CET445502465.139.24.93192.168.2.7
                                    Jan 14, 2025 21:16:53.570564985 CET50246445192.168.2.75.139.24.93
                                    Jan 14, 2025 21:16:53.570653915 CET445502475.139.24.1192.168.2.7
                                    Jan 14, 2025 21:16:53.570725918 CET50247445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.570765018 CET50247445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.571007013 CET50248445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.575970888 CET445502475.139.24.1192.168.2.7
                                    Jan 14, 2025 21:16:53.575985909 CET445502485.139.24.1192.168.2.7
                                    Jan 14, 2025 21:16:53.576029062 CET50247445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.576077938 CET50248445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.576106071 CET50248445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:16:53.581028938 CET445502485.139.24.1192.168.2.7
                                    Jan 14, 2025 21:16:54.185873032 CET50253445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:54.190761089 CET44550253203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:54.190838099 CET50253445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:54.191332102 CET50253445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:16:54.197762966 CET44550253203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:16:55.190224886 CET44550024175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:55.190310001 CET50024445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:55.190346003 CET50024445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:55.190396070 CET50024445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:55.195247889 CET44550024175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:55.195265055 CET44550024175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:55.201298952 CET50260445192.168.2.7217.178.18.169
                                    Jan 14, 2025 21:16:55.206397057 CET44550260217.178.18.169192.168.2.7
                                    Jan 14, 2025 21:16:55.206506968 CET50260445192.168.2.7217.178.18.169
                                    Jan 14, 2025 21:16:55.206573963 CET50260445192.168.2.7217.178.18.169
                                    Jan 14, 2025 21:16:55.206626892 CET50261445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.211689949 CET44550261217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:16:55.211779118 CET50261445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.211779118 CET50261445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.211821079 CET44550260217.178.18.169192.168.2.7
                                    Jan 14, 2025 21:16:55.212090015 CET50260445192.168.2.7217.178.18.169
                                    Jan 14, 2025 21:16:55.212096930 CET50262445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.217057943 CET44550261217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:16:55.217073917 CET44550262217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:16:55.217116117 CET50261445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.217159033 CET50262445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.217180014 CET50262445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:16:55.222044945 CET44550262217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:16:56.252439976 CET50270445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:56.257344007 CET44550270115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:56.257436991 CET50270445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:56.304038048 CET50270445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:16:56.308870077 CET44550270115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:16:56.733458996 CET50274445192.168.2.771.37.178.181
                                    Jan 14, 2025 21:16:56.739089966 CET4455027471.37.178.181192.168.2.7
                                    Jan 14, 2025 21:16:56.739183903 CET50274445192.168.2.771.37.178.181
                                    Jan 14, 2025 21:16:56.739259005 CET50274445192.168.2.771.37.178.181
                                    Jan 14, 2025 21:16:56.739684105 CET50275445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.744190931 CET4455027471.37.178.181192.168.2.7
                                    Jan 14, 2025 21:16:56.744262934 CET50274445192.168.2.771.37.178.181
                                    Jan 14, 2025 21:16:56.744503021 CET4455027571.37.178.1192.168.2.7
                                    Jan 14, 2025 21:16:56.744699001 CET50275445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.746819019 CET50275445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.747051001 CET50276445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.753025055 CET4455027671.37.178.1192.168.2.7
                                    Jan 14, 2025 21:16:56.753109932 CET50276445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.754530907 CET50276445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.756056070 CET4455027571.37.178.1192.168.2.7
                                    Jan 14, 2025 21:16:56.756128073 CET50275445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:16:56.760474920 CET4455027671.37.178.1192.168.2.7
                                    Jan 14, 2025 21:16:57.256159067 CET44550058152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:57.256268978 CET50058445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:57.256313086 CET50058445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:57.256398916 CET50058445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:16:57.261122942 CET44550058152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:57.261226892 CET44550058152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:16:58.154535055 CET50287445192.168.2.771.26.60.16
                                    Jan 14, 2025 21:16:58.159436941 CET4455028771.26.60.16192.168.2.7
                                    Jan 14, 2025 21:16:58.159533978 CET50287445192.168.2.771.26.60.16
                                    Jan 14, 2025 21:16:58.159605026 CET50287445192.168.2.771.26.60.16
                                    Jan 14, 2025 21:16:58.159737110 CET50288445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.164586067 CET4455028871.26.60.1192.168.2.7
                                    Jan 14, 2025 21:16:58.164657116 CET4455028771.26.60.16192.168.2.7
                                    Jan 14, 2025 21:16:58.164664984 CET50288445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.164711952 CET50287445192.168.2.771.26.60.16
                                    Jan 14, 2025 21:16:58.164732933 CET50288445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.164969921 CET50289445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.169826984 CET4455028971.26.60.1192.168.2.7
                                    Jan 14, 2025 21:16:58.169857979 CET4455028871.26.60.1192.168.2.7
                                    Jan 14, 2025 21:16:58.169924021 CET50289445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.169959068 CET50288445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.169974089 CET50289445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:16:58.174796104 CET4455028971.26.60.1192.168.2.7
                                    Jan 14, 2025 21:16:58.200936079 CET50290445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:58.205828905 CET44550290175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:58.206247091 CET50290445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:58.206280947 CET50290445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:16:58.211222887 CET44550290175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:16:59.237508059 CET4455009220.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:59.237616062 CET50092445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:59.238878012 CET50092445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:59.238924980 CET50092445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:16:59.243731022 CET4455009220.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:59.243745089 CET4455009220.92.128.1192.168.2.7
                                    Jan 14, 2025 21:16:59.483522892 CET50296445192.168.2.7172.142.199.38
                                    Jan 14, 2025 21:16:59.491090059 CET44550296172.142.199.38192.168.2.7
                                    Jan 14, 2025 21:16:59.491149902 CET50296445192.168.2.7172.142.199.38
                                    Jan 14, 2025 21:16:59.491250992 CET50296445192.168.2.7172.142.199.38
                                    Jan 14, 2025 21:16:59.491556883 CET50297445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.496495008 CET44550296172.142.199.38192.168.2.7
                                    Jan 14, 2025 21:16:59.496603012 CET50296445192.168.2.7172.142.199.38
                                    Jan 14, 2025 21:16:59.496794939 CET44550297172.142.199.1192.168.2.7
                                    Jan 14, 2025 21:16:59.496871948 CET50297445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.496959925 CET50297445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.497497082 CET50299445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.502259016 CET44550297172.142.199.1192.168.2.7
                                    Jan 14, 2025 21:16:59.502332926 CET50297445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.502764940 CET44550299172.142.199.1192.168.2.7
                                    Jan 14, 2025 21:16:59.502834082 CET50299445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.502873898 CET50299445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:16:59.508074045 CET44550299172.142.199.1192.168.2.7
                                    Jan 14, 2025 21:17:00.263482094 CET50303445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:17:00.268409967 CET44550303152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:17:00.268596888 CET50303445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:17:00.268635035 CET50303445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:17:00.273413897 CET44550303152.120.88.1192.168.2.7
                                    Jan 14, 2025 21:17:00.734188080 CET50307445192.168.2.763.93.143.167
                                    Jan 14, 2025 21:17:00.739053011 CET4455030763.93.143.167192.168.2.7
                                    Jan 14, 2025 21:17:00.739141941 CET50307445192.168.2.763.93.143.167
                                    Jan 14, 2025 21:17:00.739248037 CET50307445192.168.2.763.93.143.167
                                    Jan 14, 2025 21:17:00.739348888 CET50308445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.744103909 CET4455030863.93.143.1192.168.2.7
                                    Jan 14, 2025 21:17:00.744180918 CET50308445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.744226933 CET4455030763.93.143.167192.168.2.7
                                    Jan 14, 2025 21:17:00.744281054 CET50308445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.744281054 CET50307445192.168.2.763.93.143.167
                                    Jan 14, 2025 21:17:00.744503021 CET50310445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.749136925 CET4455030863.93.143.1192.168.2.7
                                    Jan 14, 2025 21:17:00.749191999 CET50308445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.749315977 CET4455031063.93.143.1192.168.2.7
                                    Jan 14, 2025 21:17:00.749376059 CET50310445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.749469995 CET50310445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:00.754210949 CET4455031063.93.143.1192.168.2.7
                                    Jan 14, 2025 21:17:01.365972042 CET445501271.183.9.1192.168.2.7
                                    Jan 14, 2025 21:17:01.366202116 CET50127445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:01.366275072 CET50127445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:01.366316080 CET50127445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:01.371167898 CET445501271.183.9.1192.168.2.7
                                    Jan 14, 2025 21:17:01.371181965 CET445501271.183.9.1192.168.2.7
                                    Jan 14, 2025 21:17:01.492727041 CET4455013243.2.130.1192.168.2.7
                                    Jan 14, 2025 21:17:01.492808104 CET50132445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:17:01.492863894 CET50132445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:17:01.492917061 CET50132445192.168.2.743.2.130.1
                                    Jan 14, 2025 21:17:01.497747898 CET4455013243.2.130.1192.168.2.7
                                    Jan 14, 2025 21:17:01.497761965 CET4455013243.2.130.1192.168.2.7
                                    Jan 14, 2025 21:17:01.544894934 CET50315445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.549748898 CET4455031543.2.130.2192.168.2.7
                                    Jan 14, 2025 21:17:01.549844027 CET50315445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.549885988 CET50315445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.550228119 CET50316445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.554867983 CET4455031543.2.130.2192.168.2.7
                                    Jan 14, 2025 21:17:01.554934978 CET50315445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.555020094 CET4455031643.2.130.2192.168.2.7
                                    Jan 14, 2025 21:17:01.555099010 CET50316445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.555140972 CET50316445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:01.559968948 CET4455031643.2.130.2192.168.2.7
                                    Jan 14, 2025 21:17:01.888942003 CET50318445192.168.2.7112.46.66.46
                                    Jan 14, 2025 21:17:01.894082069 CET44550318112.46.66.46192.168.2.7
                                    Jan 14, 2025 21:17:01.894165993 CET50318445192.168.2.7112.46.66.46
                                    Jan 14, 2025 21:17:01.894279957 CET50318445192.168.2.7112.46.66.46
                                    Jan 14, 2025 21:17:01.894435883 CET50319445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.899346113 CET44550319112.46.66.1192.168.2.7
                                    Jan 14, 2025 21:17:01.899403095 CET44550318112.46.66.46192.168.2.7
                                    Jan 14, 2025 21:17:01.899418116 CET50319445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.899461031 CET50318445192.168.2.7112.46.66.46
                                    Jan 14, 2025 21:17:01.899523973 CET50319445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.899977922 CET50320445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.904512882 CET44550319112.46.66.1192.168.2.7
                                    Jan 14, 2025 21:17:01.904599905 CET50319445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.904834986 CET44550320112.46.66.1192.168.2.7
                                    Jan 14, 2025 21:17:01.904898882 CET50320445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.904990911 CET50320445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:01.909877062 CET44550320112.46.66.1192.168.2.7
                                    Jan 14, 2025 21:17:02.264148951 CET50321445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:17:02.269134045 CET4455032120.92.128.1192.168.2.7
                                    Jan 14, 2025 21:17:02.269251108 CET50321445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:17:02.286217928 CET50321445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:17:02.291275024 CET4455032120.92.128.1192.168.2.7
                                    Jan 14, 2025 21:17:02.967005968 CET50322445192.168.2.7105.69.249.33
                                    Jan 14, 2025 21:17:02.971951008 CET44550322105.69.249.33192.168.2.7
                                    Jan 14, 2025 21:17:02.972109079 CET50322445192.168.2.7105.69.249.33
                                    Jan 14, 2025 21:17:02.972227097 CET50322445192.168.2.7105.69.249.33
                                    Jan 14, 2025 21:17:02.972420931 CET50323445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.977261066 CET44550322105.69.249.33192.168.2.7
                                    Jan 14, 2025 21:17:02.977320910 CET44550323105.69.249.1192.168.2.7
                                    Jan 14, 2025 21:17:02.977339983 CET50322445192.168.2.7105.69.249.33
                                    Jan 14, 2025 21:17:02.977415085 CET50323445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.977415085 CET50323445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.977672100 CET50324445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.982467890 CET44550323105.69.249.1192.168.2.7
                                    Jan 14, 2025 21:17:02.982547998 CET44550324105.69.249.1192.168.2.7
                                    Jan 14, 2025 21:17:02.982583046 CET50323445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.982613087 CET50324445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.982633114 CET50324445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:02.987436056 CET44550324105.69.249.1192.168.2.7
                                    Jan 14, 2025 21:17:03.272136927 CET4455015334.1.98.1192.168.2.7
                                    Jan 14, 2025 21:17:03.272607088 CET50153445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:03.272607088 CET50153445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:03.272607088 CET50153445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:03.277563095 CET4455015334.1.98.1192.168.2.7
                                    Jan 14, 2025 21:17:03.277575016 CET4455015334.1.98.1192.168.2.7
                                    Jan 14, 2025 21:17:03.522011042 CET44550154142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:17:03.522130013 CET50154445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:17:03.522211075 CET50154445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:17:03.522351980 CET50154445192.168.2.7142.87.184.1
                                    Jan 14, 2025 21:17:03.527017117 CET44550154142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:17:03.527065039 CET44550154142.87.184.1192.168.2.7
                                    Jan 14, 2025 21:17:03.576270103 CET50325445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.581377029 CET44550325142.87.184.2192.168.2.7
                                    Jan 14, 2025 21:17:03.581515074 CET50325445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.581549883 CET50325445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.582006931 CET50326445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.586613894 CET44550325142.87.184.2192.168.2.7
                                    Jan 14, 2025 21:17:03.586699963 CET50325445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.586786985 CET44550326142.87.184.2192.168.2.7
                                    Jan 14, 2025 21:17:03.586853027 CET50326445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.586898088 CET50326445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:03.591790915 CET44550326142.87.184.2192.168.2.7
                                    Jan 14, 2025 21:17:03.983273983 CET50327445192.168.2.7169.225.156.92
                                    Jan 14, 2025 21:17:03.988080978 CET44550327169.225.156.92192.168.2.7
                                    Jan 14, 2025 21:17:03.988181114 CET50327445192.168.2.7169.225.156.92
                                    Jan 14, 2025 21:17:03.988300085 CET50327445192.168.2.7169.225.156.92
                                    Jan 14, 2025 21:17:03.988513947 CET50328445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:03.993280888 CET44550328169.225.156.1192.168.2.7
                                    Jan 14, 2025 21:17:03.993341923 CET44550327169.225.156.92192.168.2.7
                                    Jan 14, 2025 21:17:03.993422985 CET50328445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:03.993444920 CET50327445192.168.2.7169.225.156.92
                                    Jan 14, 2025 21:17:03.993541002 CET50328445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:03.993913889 CET50329445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:03.998783112 CET44550329169.225.156.1192.168.2.7
                                    Jan 14, 2025 21:17:03.998869896 CET50329445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:03.998975039 CET50329445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:04.000308990 CET44550328169.225.156.1192.168.2.7
                                    Jan 14, 2025 21:17:04.001096010 CET44550328169.225.156.1192.168.2.7
                                    Jan 14, 2025 21:17:04.001143932 CET50328445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:04.004302025 CET44550329169.225.156.1192.168.2.7
                                    Jan 14, 2025 21:17:04.372997046 CET50330445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:04.377901077 CET445503301.183.9.1192.168.2.7
                                    Jan 14, 2025 21:17:04.378000975 CET50330445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:04.378031969 CET50330445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:04.385536909 CET445503301.183.9.1192.168.2.7
                                    Jan 14, 2025 21:17:04.975332022 CET50331445192.168.2.7112.94.83.130
                                    Jan 14, 2025 21:17:04.980475903 CET44550331112.94.83.130192.168.2.7
                                    Jan 14, 2025 21:17:04.984081030 CET50331445192.168.2.7112.94.83.130
                                    Jan 14, 2025 21:17:04.984205961 CET50331445192.168.2.7112.94.83.130
                                    Jan 14, 2025 21:17:04.984375000 CET50332445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:04.989301920 CET44550332112.94.83.1192.168.2.7
                                    Jan 14, 2025 21:17:04.989337921 CET44550331112.94.83.130192.168.2.7
                                    Jan 14, 2025 21:17:04.989383936 CET50332445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:04.989407063 CET50331445192.168.2.7112.94.83.130
                                    Jan 14, 2025 21:17:04.992672920 CET50332445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:04.993100882 CET50333445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:04.997540951 CET44550332112.94.83.1192.168.2.7
                                    Jan 14, 2025 21:17:04.997633934 CET50332445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:04.997987032 CET44550333112.94.83.1192.168.2.7
                                    Jan 14, 2025 21:17:04.998059034 CET50333445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:05.004040003 CET50333445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:05.008948088 CET44550333112.94.83.1192.168.2.7
                                    Jan 14, 2025 21:17:05.321991920 CET44550168164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:17:05.324645996 CET50168445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:05.324698925 CET50168445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:05.324717045 CET50168445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:05.329574108 CET44550168164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:17:05.329585075 CET44550168164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:17:05.504703045 CET4455017296.124.10.1192.168.2.7
                                    Jan 14, 2025 21:17:05.504781961 CET50172445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:17:05.504852057 CET50172445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:17:05.504935980 CET50172445192.168.2.796.124.10.1
                                    Jan 14, 2025 21:17:05.509691000 CET4455017296.124.10.1192.168.2.7
                                    Jan 14, 2025 21:17:05.509725094 CET4455017296.124.10.1192.168.2.7
                                    Jan 14, 2025 21:17:05.560942888 CET50334445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.566102982 CET4455033496.124.10.2192.168.2.7
                                    Jan 14, 2025 21:17:05.566200972 CET50334445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.566328049 CET50334445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.566863060 CET50335445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.571327925 CET4455033496.124.10.2192.168.2.7
                                    Jan 14, 2025 21:17:05.571394920 CET50334445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.571749926 CET4455033596.124.10.2192.168.2.7
                                    Jan 14, 2025 21:17:05.571815014 CET50335445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.571858883 CET50335445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:05.576662064 CET4455033596.124.10.2192.168.2.7
                                    Jan 14, 2025 21:17:05.844981909 CET50336445192.168.2.7178.7.0.211
                                    Jan 14, 2025 21:17:05.849942923 CET44550336178.7.0.211192.168.2.7
                                    Jan 14, 2025 21:17:05.850285053 CET50337445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.851330042 CET50336445192.168.2.7178.7.0.211
                                    Jan 14, 2025 21:17:05.851330042 CET50336445192.168.2.7178.7.0.211
                                    Jan 14, 2025 21:17:05.855149984 CET44550337178.7.0.1192.168.2.7
                                    Jan 14, 2025 21:17:05.855211020 CET50337445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.855242014 CET50337445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.855551004 CET50338445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.856311083 CET44550336178.7.0.211192.168.2.7
                                    Jan 14, 2025 21:17:05.856427908 CET44550336178.7.0.211192.168.2.7
                                    Jan 14, 2025 21:17:05.859330893 CET50336445192.168.2.7178.7.0.211
                                    Jan 14, 2025 21:17:05.860131025 CET44550337178.7.0.1192.168.2.7
                                    Jan 14, 2025 21:17:05.860265970 CET50337445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.860337019 CET44550338178.7.0.1192.168.2.7
                                    Jan 14, 2025 21:17:05.860397100 CET50338445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.860446930 CET50338445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:05.865154028 CET44550338178.7.0.1192.168.2.7
                                    Jan 14, 2025 21:17:06.279236078 CET50339445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:06.284104109 CET4455033934.1.98.1192.168.2.7
                                    Jan 14, 2025 21:17:06.284190893 CET50339445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:06.284228086 CET50339445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:06.288949013 CET4455033934.1.98.1192.168.2.7
                                    Jan 14, 2025 21:17:06.670280933 CET50341445192.168.2.78.157.48.192
                                    Jan 14, 2025 21:17:06.675302029 CET445503418.157.48.192192.168.2.7
                                    Jan 14, 2025 21:17:06.675440073 CET50341445192.168.2.78.157.48.192
                                    Jan 14, 2025 21:17:06.675487041 CET50341445192.168.2.78.157.48.192
                                    Jan 14, 2025 21:17:06.675606966 CET50342445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.680551052 CET445503428.157.48.1192.168.2.7
                                    Jan 14, 2025 21:17:06.680607080 CET445503418.157.48.192192.168.2.7
                                    Jan 14, 2025 21:17:06.680640936 CET50342445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.680680037 CET50341445192.168.2.78.157.48.192
                                    Jan 14, 2025 21:17:06.680815935 CET50342445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.681284904 CET50343445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.685710907 CET445503428.157.48.1192.168.2.7
                                    Jan 14, 2025 21:17:06.685785055 CET50342445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.686142921 CET445503438.157.48.1192.168.2.7
                                    Jan 14, 2025 21:17:06.686235905 CET50343445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.686265945 CET50343445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:06.691102028 CET445503438.157.48.1192.168.2.7
                                    Jan 14, 2025 21:17:07.321674109 CET44550186165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:17:07.321765900 CET50186445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:07.321814060 CET50186445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:07.321830988 CET50186445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:07.326762915 CET44550186165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:17:07.326910019 CET44550186165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:17:07.435722113 CET50344445192.168.2.7193.95.220.19
                                    Jan 14, 2025 21:17:07.440560102 CET44550344193.95.220.19192.168.2.7
                                    Jan 14, 2025 21:17:07.440668106 CET50344445192.168.2.7193.95.220.19
                                    Jan 14, 2025 21:17:07.440772057 CET50344445192.168.2.7193.95.220.19
                                    Jan 14, 2025 21:17:07.440916061 CET50345445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.445760012 CET44550344193.95.220.19192.168.2.7
                                    Jan 14, 2025 21:17:07.445791960 CET44550345193.95.220.1192.168.2.7
                                    Jan 14, 2025 21:17:07.445863008 CET50344445192.168.2.7193.95.220.19
                                    Jan 14, 2025 21:17:07.445904016 CET50345445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.446152925 CET50345445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.446635008 CET50346445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.451040030 CET44550345193.95.220.1192.168.2.7
                                    Jan 14, 2025 21:17:07.451132059 CET50345445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.451524973 CET44550346193.95.220.1192.168.2.7
                                    Jan 14, 2025 21:17:07.451654911 CET50346445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.451729059 CET50346445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:07.455725908 CET4455018799.127.218.1192.168.2.7
                                    Jan 14, 2025 21:17:07.455802917 CET50187445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:17:07.455938101 CET50187445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:17:07.456032991 CET50187445192.168.2.799.127.218.1
                                    Jan 14, 2025 21:17:07.456496000 CET44550346193.95.220.1192.168.2.7
                                    Jan 14, 2025 21:17:07.460783958 CET4455018799.127.218.1192.168.2.7
                                    Jan 14, 2025 21:17:07.460828066 CET4455018799.127.218.1192.168.2.7
                                    Jan 14, 2025 21:17:07.632550001 CET50347445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.637589931 CET4455034799.127.218.2192.168.2.7
                                    Jan 14, 2025 21:17:07.637733936 CET50347445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.637866020 CET50347445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.642854929 CET4455034799.127.218.2192.168.2.7
                                    Jan 14, 2025 21:17:07.642955065 CET50347445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.703650951 CET50348445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.708647013 CET4455034899.127.218.2192.168.2.7
                                    Jan 14, 2025 21:17:07.708760977 CET50348445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.708760977 CET50348445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:07.713731050 CET4455034899.127.218.2192.168.2.7
                                    Jan 14, 2025 21:17:08.326071024 CET50350445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:08.331338882 CET44550350164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:17:08.331444979 CET50350445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:08.331490040 CET50350445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:08.336479902 CET44550350164.198.53.1192.168.2.7
                                    Jan 14, 2025 21:17:09.334943056 CET44550202138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:17:09.335066080 CET50202445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:09.335122108 CET50202445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:09.335169077 CET50202445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:09.339962959 CET44550202138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:17:09.339976072 CET44550202138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:17:09.518307924 CET4455020578.108.125.1192.168.2.7
                                    Jan 14, 2025 21:17:09.518492937 CET50205445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:17:09.518587112 CET50205445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:17:09.518587112 CET50205445192.168.2.778.108.125.1
                                    Jan 14, 2025 21:17:09.523452044 CET4455020578.108.125.1192.168.2.7
                                    Jan 14, 2025 21:17:09.523467064 CET4455020578.108.125.1192.168.2.7
                                    Jan 14, 2025 21:17:09.576292992 CET50354445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.581126928 CET4455035478.108.125.2192.168.2.7
                                    Jan 14, 2025 21:17:09.581293106 CET50354445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.581329107 CET50354445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.581787109 CET50355445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.586471081 CET4455035478.108.125.2192.168.2.7
                                    Jan 14, 2025 21:17:09.586538076 CET4455035578.108.125.2192.168.2.7
                                    Jan 14, 2025 21:17:09.586549044 CET50354445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.586602926 CET50355445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.586648941 CET50355445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:09.591523886 CET4455035578.108.125.2192.168.2.7
                                    Jan 14, 2025 21:17:10.326034069 CET50358445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:10.331199884 CET44550358165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:17:10.334255934 CET50358445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:10.334322929 CET50358445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:10.339159012 CET44550358165.200.102.1192.168.2.7
                                    Jan 14, 2025 21:17:11.366159916 CET44550216218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:17:11.366267920 CET50216445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:11.366341114 CET50216445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:11.366406918 CET50216445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:11.371184111 CET44550216218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:17:11.371196032 CET44550216218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:17:11.631759882 CET4455021919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:17:11.631845951 CET50219445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:17:11.631953001 CET50219445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:17:11.632097960 CET50219445192.168.2.719.176.243.1
                                    Jan 14, 2025 21:17:11.636776924 CET4455021919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:17:11.636917114 CET4455021919.176.243.1192.168.2.7
                                    Jan 14, 2025 21:17:11.685648918 CET50367445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.690738916 CET4455036719.176.243.2192.168.2.7
                                    Jan 14, 2025 21:17:11.690843105 CET50367445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.690887928 CET50367445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.691200972 CET50368445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.695882082 CET4455036719.176.243.2192.168.2.7
                                    Jan 14, 2025 21:17:11.695951939 CET50367445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.695979118 CET4455036819.176.243.2192.168.2.7
                                    Jan 14, 2025 21:17:11.696033001 CET50368445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.696053028 CET50368445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:11.700792074 CET4455036819.176.243.2192.168.2.7
                                    Jan 14, 2025 21:17:12.341731071 CET50375445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:12.346658945 CET44550375138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:17:12.346740007 CET50375445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:12.346798897 CET50375445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:12.351641893 CET44550375138.51.125.1192.168.2.7
                                    Jan 14, 2025 21:17:13.205806017 CET44550233148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:17:13.205897093 CET50233445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:13.205943108 CET50233445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:13.205991983 CET50233445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:13.210761070 CET44550233148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:17:13.210771084 CET44550233148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:17:13.614634037 CET445502356.45.217.1192.168.2.7
                                    Jan 14, 2025 21:17:13.614712000 CET50235445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:17:13.614744902 CET50235445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:17:13.614805937 CET50235445192.168.2.76.45.217.1
                                    Jan 14, 2025 21:17:13.619612932 CET445502356.45.217.1192.168.2.7
                                    Jan 14, 2025 21:17:13.619625092 CET445502356.45.217.1192.168.2.7
                                    Jan 14, 2025 21:17:13.670264959 CET50389445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.675219059 CET445503896.45.217.2192.168.2.7
                                    Jan 14, 2025 21:17:13.675345898 CET50389445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.675383091 CET50389445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.675801992 CET50390445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.680382967 CET445503896.45.217.2192.168.2.7
                                    Jan 14, 2025 21:17:13.680881023 CET445503906.45.217.2192.168.2.7
                                    Jan 14, 2025 21:17:13.680972099 CET50390445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.680986881 CET50390445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.681876898 CET445503896.45.217.2192.168.2.7
                                    Jan 14, 2025 21:17:13.681929111 CET50389445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:13.685755014 CET445503906.45.217.2192.168.2.7
                                    Jan 14, 2025 21:17:14.373126984 CET50400445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:14.425000906 CET44550400218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:17:14.425116062 CET50400445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:14.425148964 CET50400445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:14.430064917 CET44550400218.13.74.1192.168.2.7
                                    Jan 14, 2025 21:17:14.940304995 CET445502485.139.24.1192.168.2.7
                                    Jan 14, 2025 21:17:14.940398932 CET50248445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:14.940432072 CET50248445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:14.940501928 CET50248445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:14.945306063 CET445502485.139.24.1192.168.2.7
                                    Jan 14, 2025 21:17:14.945317984 CET445502485.139.24.1192.168.2.7
                                    Jan 14, 2025 21:17:15.582679033 CET44550253203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:17:15.582798958 CET50253445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:17:15.582798958 CET50253445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:17:15.582902908 CET50253445192.168.2.7203.35.95.1
                                    Jan 14, 2025 21:17:15.587621927 CET44550253203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:17:15.587641954 CET44550253203.35.95.1192.168.2.7
                                    Jan 14, 2025 21:17:15.638576031 CET50425445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.643506050 CET44550425203.35.95.2192.168.2.7
                                    Jan 14, 2025 21:17:15.643621922 CET50425445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.643661022 CET50425445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.643865108 CET50426445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.648765087 CET44550426203.35.95.2192.168.2.7
                                    Jan 14, 2025 21:17:15.648888111 CET50426445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.649319887 CET44550425203.35.95.2192.168.2.7
                                    Jan 14, 2025 21:17:15.649363995 CET50426445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.649385929 CET50425445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:15.654256105 CET44550426203.35.95.2192.168.2.7
                                    Jan 14, 2025 21:17:16.216677904 CET50440445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:16.221678972 CET44550440148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:17:16.221767902 CET50440445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:16.221796989 CET50440445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:16.226644039 CET44550440148.159.167.1192.168.2.7
                                    Jan 14, 2025 21:17:16.677891016 CET44550262217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:17:16.678009987 CET50262445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:17:16.705873966 CET50262445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:17:16.705874920 CET50262445192.168.2.7217.178.18.1
                                    Jan 14, 2025 21:17:16.710864067 CET44550262217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:17:16.710877895 CET44550262217.178.18.1192.168.2.7
                                    Jan 14, 2025 21:17:17.632685900 CET44550270115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:17:17.632880926 CET50270445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:17:17.632925987 CET50270445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:17:17.632973909 CET50270445192.168.2.7115.209.51.1
                                    Jan 14, 2025 21:17:17.638225079 CET44550270115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:17:17.638233900 CET44550270115.209.51.1192.168.2.7
                                    Jan 14, 2025 21:17:17.685630083 CET50483445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.691899061 CET44550483115.209.51.2192.168.2.7
                                    Jan 14, 2025 21:17:17.691986084 CET50483445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.691986084 CET50483445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.692228079 CET50484445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.699249029 CET44550483115.209.51.2192.168.2.7
                                    Jan 14, 2025 21:17:17.699306011 CET50483445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.699558973 CET44550484115.209.51.2192.168.2.7
                                    Jan 14, 2025 21:17:17.699631929 CET50484445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.699666977 CET50484445192.168.2.7115.209.51.2
                                    Jan 14, 2025 21:17:17.707403898 CET44550484115.209.51.2192.168.2.7
                                    Jan 14, 2025 21:17:17.951153040 CET50495445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:17.955981016 CET445504955.139.24.1192.168.2.7
                                    Jan 14, 2025 21:17:17.956115961 CET50495445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:17.956115961 CET50495445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:17.960927010 CET445504955.139.24.1192.168.2.7
                                    Jan 14, 2025 21:17:18.145473003 CET4455027671.37.178.1192.168.2.7
                                    Jan 14, 2025 21:17:18.145584106 CET50276445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:17:18.145667076 CET50276445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:17:18.145667076 CET50276445192.168.2.771.37.178.1
                                    Jan 14, 2025 21:17:18.150513887 CET4455027671.37.178.1192.168.2.7
                                    Jan 14, 2025 21:17:18.150526047 CET4455027671.37.178.1192.168.2.7
                                    Jan 14, 2025 21:17:19.535964966 CET4455028971.26.60.1192.168.2.7
                                    Jan 14, 2025 21:17:19.536021948 CET50289445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:17:19.598367929 CET44550290175.113.195.1192.168.2.7
                                    Jan 14, 2025 21:17:19.598431110 CET50290445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:17:20.862885952 CET44550299172.142.199.1192.168.2.7
                                    Jan 14, 2025 21:17:20.863090038 CET50299445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:17:20.940531969 CET50348445192.168.2.799.127.218.2
                                    Jan 14, 2025 21:17:20.940535069 CET50495445192.168.2.75.139.24.1
                                    Jan 14, 2025 21:17:20.940535069 CET50355445192.168.2.778.108.125.2
                                    Jan 14, 2025 21:17:20.940534115 CET50440445192.168.2.7148.159.167.1
                                    Jan 14, 2025 21:17:20.940604925 CET50368445192.168.2.719.176.243.2
                                    Jan 14, 2025 21:17:20.940609932 CET50326445192.168.2.7142.87.184.2
                                    Jan 14, 2025 21:17:20.940717936 CET50289445192.168.2.771.26.60.1
                                    Jan 14, 2025 21:17:20.940752983 CET50303445192.168.2.7152.120.88.1
                                    Jan 14, 2025 21:17:20.940758944 CET50316445192.168.2.743.2.130.2
                                    Jan 14, 2025 21:17:20.940772057 CET50310445192.168.2.763.93.143.1
                                    Jan 14, 2025 21:17:20.940758944 CET50290445192.168.2.7175.113.195.1
                                    Jan 14, 2025 21:17:20.940758944 CET50299445192.168.2.7172.142.199.1
                                    Jan 14, 2025 21:17:20.940809011 CET50320445192.168.2.7112.46.66.1
                                    Jan 14, 2025 21:17:20.940834045 CET50321445192.168.2.720.92.128.1
                                    Jan 14, 2025 21:17:20.940865993 CET50324445192.168.2.7105.69.249.1
                                    Jan 14, 2025 21:17:20.940905094 CET50329445192.168.2.7169.225.156.1
                                    Jan 14, 2025 21:17:20.940989971 CET50330445192.168.2.71.183.9.1
                                    Jan 14, 2025 21:17:20.941037893 CET50335445192.168.2.796.124.10.2
                                    Jan 14, 2025 21:17:20.941040039 CET50333445192.168.2.7112.94.83.1
                                    Jan 14, 2025 21:17:20.941066027 CET50338445192.168.2.7178.7.0.1
                                    Jan 14, 2025 21:17:20.941101074 CET50339445192.168.2.734.1.98.1
                                    Jan 14, 2025 21:17:20.941126108 CET50343445192.168.2.78.157.48.1
                                    Jan 14, 2025 21:17:20.941164017 CET50346445192.168.2.7193.95.220.1
                                    Jan 14, 2025 21:17:20.941193104 CET50358445192.168.2.7165.200.102.1
                                    Jan 14, 2025 21:17:20.941207886 CET50350445192.168.2.7164.198.53.1
                                    Jan 14, 2025 21:17:20.941270113 CET50375445192.168.2.7138.51.125.1
                                    Jan 14, 2025 21:17:20.941319942 CET50400445192.168.2.7218.13.74.1
                                    Jan 14, 2025 21:17:20.941320896 CET50390445192.168.2.76.45.217.2
                                    Jan 14, 2025 21:17:20.941343069 CET50426445192.168.2.7203.35.95.2
                                    Jan 14, 2025 21:17:20.941433907 CET50484445192.168.2.7115.209.51.2
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 21:16:13.667608976 CET5755053192.168.2.71.1.1.1
                                    Jan 14, 2025 21:16:14.088454962 CET5675553192.168.2.71.1.1.1
                                    Jan 14, 2025 21:16:14.099109888 CET53567551.1.1.1192.168.2.7
                                    Jan 14, 2025 21:17:09.285229921 CET138138192.168.2.7192.168.2.255
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 14, 2025 21:16:13.667608976 CET192.168.2.71.1.1.10xc705Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                    Jan 14, 2025 21:16:14.088454962 CET192.168.2.71.1.1.10xc3ecStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 14, 2025 21:16:13.674582005 CET1.1.1.1192.168.2.70xc705No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Jan 14, 2025 21:16:14.099109888 CET1.1.1.1192.168.2.70xc3ecNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                    Jan 14, 2025 21:16:14.099109888 CET1.1.1.1192.168.2.70xc3ecNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                    • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.749701104.16.167.228807644C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 14, 2025 21:16:14.144634008 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 14, 2025 21:16:14.631414890 CET778INHTTP/1.1 200 OK
                                    Date: Tue, 14 Jan 2025 20:16:14 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 90204d7aff4b8cee-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.749702104.16.167.228807804C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 14, 2025 21:16:15.107870102 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 14, 2025 21:16:15.612737894 CET778INHTTP/1.1 200 OK
                                    Date: Tue, 14 Jan 2025 20:16:15 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 90204d812d4e2361-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.749719104.16.167.228807936C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 14, 2025 21:16:16.407429934 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 14, 2025 21:16:16.886672974 CET778INHTTP/1.1 200 OK
                                    Date: Tue, 14 Jan 2025 20:16:16 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 90204d891f057d16-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll"
                                    Imagebase:0x7e0000
                                    File size:126'464 bytes
                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:1
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff75da10000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1
                                    Imagebase:0x410000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\hsmSW6Eifl.dll,PlayGame
                                    Imagebase:0xf30000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",#1
                                    Imagebase:0xf30000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:22A591EE2E6E2B72CAF6F0BCEE2DDE20
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1308374929.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1308531572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1308531572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:8
                                    Start time:15:16:12
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                    Imagebase:0x460000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:9
                                    Start time:15:16:14
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:22A591EE2E6E2B72CAF6F0BCEE2DDE20
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1323343347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1323602244.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1323602244.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1976173358.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1976173358.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1975743881.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1975743881.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:15:16:15
                                    Start date:14/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:A089E2E733A58751CAB58BA261ACC543
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1333622807.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 93%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:11
                                    Start time:15:16:15
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\hsmSW6Eifl.dll",PlayGame
                                    Imagebase:0xf30000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:15:16:15
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:22A591EE2E6E2B72CAF6F0BCEE2DDE20
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000000.1337997356.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000002.1347227262.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000000.1338244640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1338244640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000002.1347387179.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1347387179.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:13
                                    Start time:15:16:16
                                    Start date:14/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:A089E2E733A58751CAB58BA261ACC543
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000D.00000002.1346779769.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000D.00000000.1346407131.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:71.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:64.9%
                                      Total number of Nodes:37
                                      Total number of Limit Nodes:9

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                      • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                      • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                      • CreateProcessA.KERNELBASE ref: 00407EE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                      • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1334692704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1334674241.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334712333.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334777159.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4281112323-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1334692704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1334674241.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334712333.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334777159.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1334692704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1334674241.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334712333.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334777159.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                      • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1334692704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1334674241.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334712333.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334777159.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1334692704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.1334674241.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334712333.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334728946.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334777159.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.1334872079.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Execution Graph

                                      Execution Coverage:34.9%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:35
                                      Total number of Limit Nodes:2

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1970760477.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1970740999.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970825834.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971538573.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971932759.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1970760477.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1970740999.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970825834.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971538573.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971932759.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                      • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1970760477.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1970740999.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970825834.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971538573.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971932759.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1970760477.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1970740999.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970825834.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971538573.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971932759.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4072214828-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1970760477.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1970740999.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970825834.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1970855211.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971495781.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971538573.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1971932759.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000009.00000002.1972272269.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                      APIs
                                      • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: /../$/..\$\../$\..\
                                      • API String ID: 3510742995-3885502717
                                      • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                      • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                      • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                      • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                      • API String ID: 2238633743-2459060434
                                      • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                      • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                      APIs
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                      • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$ManagerStart
                                      • String ID: cmd.exe /c "%s"
                                      • API String ID: 1485051382-955883872
                                      • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                      • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                      • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                      • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow$memcpy
                                      • String ID:
                                      • API String ID: 1881450474-3916222277
                                      • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                      • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                      • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                      • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                      • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                      • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                      • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                      • String ID: WANACRY!
                                      • API String ID: 283026544-1240840912
                                      • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                      • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                      • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                      • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID: $Q;@
                                      • API String ID: 2382887404-262343263
                                      • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                      • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                      • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                      • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-3916222277
                                      • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                      • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                      • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                      • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                      APIs
                                      • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                      • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$FreeProcessfree
                                      • String ID:
                                      • API String ID: 3428986607-0
                                      • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                      • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                      • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                      • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                      • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                      • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                      • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                      APIs
                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ContextCryptRelease
                                      • String ID:
                                      • API String ID: 829835001-0
                                      • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                      • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                      • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                      • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                      APIs
                                        • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                      • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                      • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                      • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                      • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                      • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                      • API String ID: 2238633743-1294736154
                                      • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                      • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: %s%s$%s%s%s$:$\
                                      • API String ID: 0-1100577047
                                      • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                      • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                      • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                      • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                      APIs
                                      • __p___argv.MSVCRT(0040F538), ref: 00402040
                                      • strcmp.MSVCRT(?), ref: 0040204B
                                      • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                      • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                        • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                      • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                      • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                      • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                        • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                        • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                        • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                        • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                      • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                      • API String ID: 1074704982-2844324180
                                      • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                      • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                      • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                      • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                      APIs
                                      • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                      • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                      • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                      • strlen.MSVCRT(?), ref: 004011A7
                                      • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                      • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                      • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                      • String ID: 0@$Software\$WanaCrypt0r
                                      • API String ID: 865909632-3421300005
                                      • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                      • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                      • String ID: %s\Intel$%s\ProgramData
                                      • API String ID: 3806094219-198707228
                                      • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                      • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                      APIs
                                        • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                      • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                      • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                      • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                        • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                      • SetLastError.KERNEL32(0000045A), ref: 00402430
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                      • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                      • API String ID: 1900561814-3657104962
                                      • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                      • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                      • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                      • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                      APIs
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                      • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                      • String ID: %s\%s
                                      • API String ID: 1036847564-4073750446
                                      • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                      • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                      APIs
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                      • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                      • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                      • CloseHandle.KERNEL32(?), ref: 004010EC
                                      • CloseHandle.KERNEL32(?), ref: 004010F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                      • String ID: D
                                      • API String ID: 786732093-2746444292
                                      • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                      • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                      APIs
                                      • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                      • __p__fmode.MSVCRT ref: 004077FC
                                      • __p__commode.MSVCRT ref: 0040780A
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                      • String ID:
                                      • API String ID: 3626615345-0
                                      • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                      • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                      • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                      • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                      APIs
                                      • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                        • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                      • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                      • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                      • String ID:
                                      • API String ID: 2141228402-0
                                      • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                      • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                      • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                      • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                      APIs
                                      • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                      • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                      • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Read$realloc
                                      • String ID: ?!@
                                      • API String ID: 1241503663-708128716
                                      • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                      • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: rand$wcslen$ComputerNamesrand
                                      • String ID:
                                      • API String ID: 3058258771-0
                                      • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                      • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                      APIs
                                      • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                      • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                      • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                      • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                      • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                      • String ID:
                                      • API String ID: 2935503933-0
                                      • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                      • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                      • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                      • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                      APIs
                                      • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                      • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                      • Sleep.KERNEL32(000003E8), ref: 00401F40
                                      • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleMutexOpenSleepsprintf
                                      • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                      • API String ID: 2780352083-2959021817
                                      • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                      • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-0
                                      • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                      • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                      • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                      • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                      APIs
                                      • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                      • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                      • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                      • fclose.MSVCRT(00000000), ref: 00401058
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefopenfreadfwrite
                                      • String ID: c.wnry
                                      • API String ID: 4000964834-3240288721
                                      • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                      • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                      • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                      • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                      • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                      • String ID:
                                      • API String ID: 2811923685-0
                                      • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                      • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                      • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                      • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Pointer$??2@Create
                                      • String ID:
                                      • API String ID: 1331958074-0
                                      • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                      • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                      APIs
                                      • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                      • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast_stricmp
                                      • String ID: P!@
                                      • API String ID: 1278613211-1774101457
                                      • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                      • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                      • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                      • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                      APIs
                                      • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                      • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesFilestrcmp
                                      • String ID: c.wnry
                                      • API String ID: 3324900478-3240288721
                                      • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                      • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                      • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                      • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                      APIs
                                      • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                      • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??3@CloseHandle
                                      • String ID: $l@
                                      • API String ID: 3816424416-2140230165
                                      • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                      • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                      • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                      • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                      • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1334170465.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 0000000A.00000002.1334151943.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334187633.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334205177.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 0000000A.00000002.1334246556.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalSection$Leave$Entermemcpy
                                      • String ID:
                                      • API String ID: 3435569088-0
                                      • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                      • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                      • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                      • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65