Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FjSrGs0AE2.dll

Overview

General Information

Sample name:FjSrGs0AE2.dll
renamed because original name is a hash value
Original sample name:879d69d4c18d6947f9ea5e545ac16d01.dll
Analysis ID:1591287
MD5:879d69d4c18d6947f9ea5e545ac16d01
SHA1:f1d32258bf2dba1c54b3c040fba34be4a8deb2cb
SHA256:e55ff68c216152b45e9e2a900cc584907c16bfcfdeb5ed6cc83ec227af907661
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5588 cmdline: loaddll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 2352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1280 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4128 cmdline: rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 3552 cmdline: C:\WINDOWS\mssecsvc.exe MD5: EC7E7FF1E52FA99EAC7DD069B2EC9C4A)
          • tasksche.exe (PID: 3684 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 962D4291A5DFAC935CA1EFF9B1E21D62)
    • rundll32.exe (PID: 2852 cmdline: rundll32.exe C:\Users\user\Desktop\FjSrGs0AE2.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4808 cmdline: rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 5252 cmdline: C:\WINDOWS\mssecsvc.exe MD5: EC7E7FF1E52FA99EAC7DD069B2EC9C4A)
        • tasksche.exe (PID: 1568 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 962D4291A5DFAC935CA1EFF9B1E21D62)
  • mssecsvc.exe (PID: 6212 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: EC7E7FF1E52FA99EAC7DD069B2EC9C4A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
FjSrGs0AE2.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    FjSrGs0AE2.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    FjSrGs0AE2.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000009.00000000.1459360802.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000008.00000000.1450405027.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000B.00000002.1475072164.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.1c2b084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvc.exe.1c2b084.4.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
              • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
              • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
              • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
              8.2.mssecsvc.exe.215a8c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvc.exe.215a8c8.8.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
              • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
              • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
              • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
              8.2.mssecsvc.exe.1c2b084.4.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 138 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FjSrGs0AE2.dllAvira: detected
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 97%
                Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 92%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
                Source: FjSrGs0AE2.dllVirustotal: Detection: 94%Perma Link
                Source: FjSrGs0AE2.dllReversingLabs: Detection: 94%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.5% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                Source: FjSrGs0AE2.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: FjSrGs0AE2.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.196
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.196
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.196
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.196
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 222.152.143.1
                Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.111
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.111
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.111
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.111
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 149.218.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.230
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.230
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.230
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.230
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.120.236.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.226
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.102.16.1
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://crmapp.bharti.com:8000/OA_HTML/AppsLocalLogin.jsp?requestUrl=%2Foa_servlets%2Fweboam%2Foam%2F
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://crmapp.bharti.com:8000/OA_HTML/AppsLocalLogin.jsp?requestUrl=APPSHOMEPAGE&cancelUrl=http%
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?cancelUrl=/OA_HTML/AppsLocalLogin.jsp&amp
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?langCode=US
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=APPSHOMEPAGE&cancelUrl=htt
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=http%3A%2F%2Fecrm.airtelworld.
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: http://ecrm.airtelworld.in:8005/OA_HTML/cabo/images/cache/en/bLogiUsz4-1.gif
                Source: mssecsvc.exe.4.drString found in binary or memory: http://icrmtelemedia.airtelworld.in:8005/OA_HTML/cabo/images/cache/en/bLogio9S-.gif
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: https://epms.airtelworld.in:4848/projectserver
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drString found in binary or memory: https://epms.airtelworld.in:4848/projectserver/_layouts/AccessDenied.aspx?loginasanotheruser=tr
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
                Source: Yara matchFile source: FjSrGs0AE2.dll, type: SAMPLE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.21658e8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1c3a104.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1c360a4.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.2169948.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1450405027.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1475072164.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1472047250.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1443452852.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1472176887.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1450711422.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3552, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6212, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5252, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                System Summary

                barindex
                Source: FjSrGs0AE2.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: FjSrGs0AE2.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1c2b084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c2b084.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.215a8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.215a8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.21658e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.21658e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1c3a104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c3a104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1c360a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1c360a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.2169948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.2169948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.1459360802.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.1474050262.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.1474497468.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.1472176887.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1450711422.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
                Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: FjSrGs0AE2.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: FjSrGs0AE2.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: FjSrGs0AE2.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1c2b084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c2b084.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.215a8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.215a8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1c2b084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1c5d128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.215a8c8.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.218c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1c5d128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.218c96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.21658e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1c3a104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.21658e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1c3a104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c3a104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1c360a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1c360a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.2169948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.2169948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.2169948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.1459360802.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.1474050262.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.1474497468.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.1472176887.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1450711422.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1474050262.000000000040E000.00000008.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@0/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2352:120:WilError_03
                Source: FjSrGs0AE2.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\FjSrGs0AE2.dll,PlayGame
                Source: FjSrGs0AE2.dllVirustotal: Detection: 94%
                Source: FjSrGs0AE2.dllReversingLabs: Detection: 94%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\FjSrGs0AE2.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\FjSrGs0AE2.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: FjSrGs0AE2.dllStatic file information: File size 5267459 > 1048576
                Source: FjSrGs0AE2.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7092Thread sleep count: 93 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7092Thread sleep time: -186000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 3672Thread sleep count: 126 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 3672Thread sleep count: 39 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7092Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 00000006.00000002.1461776893.0000000000AA7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088623754.0000000000D4D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1475657615.0000000000DEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1Jump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Windows Management Instrumentation
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts2
                Service Execution
                1
                DLL Side-Loading
                11
                Process Injection
                31
                Virtualization/Sandbox Evasion
                LSASS Memory121
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Native API
                Logon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS22
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1591287 Sample: FjSrGs0AE2.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus / Scanner detection for submitted sample 2->62 64 Multi AV Scanner detection for dropped file 2->64 66 4 other signatures 2->66 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        process3 dnsIp4 15 cmd.exe 1 9->15         started        17 rundll32.exe 9->17         started        20 rundll32.exe 1 9->20         started        23 conhost.exe 9->23         started        46 192.168.2.100 unknown unknown 11->46 48 192.168.2.101 unknown unknown 11->48 50 98 other IPs or domains 11->50 76 Connects to many different private IPs via SMB (likely to spread or exploit) 11->76 78 Connects to many different private IPs (likely to spread or exploit) 11->78 signatures5 process6 file7 25 rundll32.exe 15->25         started        58 Drops executables to the windows directory (C:\Windows) and starts them 17->58 27 mssecsvc.exe 1 17->27         started        40 C:\Windows\mssecsvc.exe, PE32 20->40 dropped signatures8 process9 file10 31 mssecsvc.exe 1 25->31         started        42 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->42 dropped 80 Drops executables to the windows directory (C:\Windows) and starts them 27->80 35 tasksche.exe 27->35         started        signatures11 process12 file13 44 C:\Windows\tasksche.exe, PE32 31->44 dropped 52 Antivirus detection for dropped file 31->52 54 Multi AV Scanner detection for dropped file 31->54 56 Machine Learning detection for dropped file 31->56 37 tasksche.exe 31->37         started        signatures14 process15 signatures16 68 Detected Wannacry Ransomware 37->68 70 Antivirus detection for dropped file 37->70 72 Multi AV Scanner detection for dropped file 37->72 74 Machine Learning detection for dropped file 37->74

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FjSrGs0AE2.dll94%VirustotalBrowse
                FjSrGs0AE2.dll95%ReversingLabsWin32.Ransomware.WannaCry
                FjSrGs0AE2.dll100%AviraTR/Ransom.Gen
                FjSrGs0AE2.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)97%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\mssecsvc.exe93%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe97%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=0%Avira URL Cloudsafe
                http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=APPSHOMEPAGE&amp;cancelUrl=htt0%Avira URL Cloudsafe
                http://icrmtelemedia.airtelworld.in:8005/OA_HTML/cabo/images/cache/en/bLogio9S-.gif0%Avira URL Cloudsafe
                https://epms.airtelworld.in:4848/projectserver/_layouts/AccessDenied.aspx?loginasanotheruser=tr0%Avira URL Cloudsafe
                http://crmapp.bharti.com:8000/OA_HTML/AppsLocalLogin.jsp?requestUrl=APPSHOMEPAGE&amp;cancelUrl=http%0%Avira URL Cloudsafe
                http://crmapp.bharti.com:8000/OA_HTML/AppsLocalLogin.jsp?requestUrl=%2Foa_servlets%2Fweboam%2Foam%2F0%Avira URL Cloudsafe
                http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?langCode=US0%Avira URL Cloudsafe
                http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?cancelUrl=/OA_HTML/AppsLocalLogin.jsp&amp0%Avira URL Cloudsafe
                https://epms.airtelworld.in:4848/projectserver0%Avira URL Cloudsafe
                http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=http%3A%2F%2Fecrm.airtelworld.0%Avira URL Cloudsafe
                http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp0%Avira URL Cloudsafe
                http://ecrm.airtelworld.in:8005/OA_HTML/cabo/images/cache/en/bLogiUsz4-1.gif0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=APPSHOMEPAGE&amp;cancelUrl=httmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crmapp.bharti.com:8000/OA_HTML/AppsLocalLogin.jsp?requestUrl=APPSHOMEPAGE&amp;cancelUrl=http%mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crmapp.bharti.com:8000/OA_HTML/AppsLocalLogin.jsp?requestUrl=%2Foa_servlets%2Fweboam%2Foam%2Fmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://epms.airtelworld.in:4848/projectserver/_layouts/AccessDenied.aspx?loginasanotheruser=trmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://icrmtelemedia.airtelworld.in:8005/OA_HTML/cabo/images/cache/en/bLogio9S-.gifmssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?langCode=USmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?cancelUrl=/OA_HTML/AppsLocalLogin.jsp&ampmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://epms.airtelworld.in:4848/projectservermssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jsp?requestUrl=http%3A%2F%2Fecrm.airtelworld.mssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ecrm.airtelworld.in:8005/OA_HTML/AppsLocalLogin.jspmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ecrm.airtelworld.in:8005/OA_HTML/cabo/images/cache/en/bLogiUsz4-1.gifmssecsvc.exe, 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1474625469.0000000000410000.00000002.00000001.01000000.00000007.sdmp, FjSrGs0AE2.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  6.20.56.177
                  unknownUnited States
                  3356LEVEL3USfalse
                  23.102.16.1
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  23.102.16.2
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  93.1.228.229
                  unknownFrance
                  15557LDCOMNETFRfalse
                  101.212.173.155
                  unknownIndia
                  58519CHINATELECOM-CTCLOUDCloudComputingCorporationCNfalse
                  20.196.19.187
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  31.64.80.1
                  unknownUnited Kingdom
                  12576EELtdGBfalse
                  22.184.197.1
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  175.120.236.230
                  unknownKorea Republic of
                  10065NICEMONEY2-AS-KRNICETCMKRfalse
                  149.218.236.111
                  unknownGermany
                  8319NETHINKS-ASNETHINKSGmbHDEfalse
                  6.20.56.1
                  unknownUnited States
                  3356LEVEL3USfalse
                  61.3.159.211
                  unknownIndia
                  9829BSNL-NIBNationalInternetBackboneINfalse
                  95.98.32.1
                  unknownNetherlands
                  31615TMO-NL-ASNLfalse
                  51.243.90.42
                  unknownUnited Kingdom
                  2686ATGS-MMD-ASUSfalse
                  31.64.80.35
                  unknownUnited Kingdom
                  12576EELtdGBfalse
                  IP
                  192.168.2.148
                  192.168.2.149
                  192.168.2.146
                  192.168.2.147
                  192.168.2.140
                  192.168.2.141
                  192.168.2.144
                  192.168.2.145
                  192.168.2.142
                  192.168.2.143
                  192.168.2.159
                  192.168.2.157
                  192.168.2.158
                  192.168.2.151
                  192.168.2.152
                  192.168.2.150
                  192.168.2.155
                  192.168.2.156
                  192.168.2.153
                  192.168.2.154
                  192.168.2.126
                  192.168.2.247
                  192.168.2.127
                  192.168.2.248
                  192.168.2.124
                  192.168.2.245
                  192.168.2.125
                  192.168.2.246
                  192.168.2.128
                  192.168.2.249
                  192.168.2.129
                  192.168.2.240
                  192.168.2.122
                  192.168.2.243
                  192.168.2.123
                  192.168.2.244
                  192.168.2.120
                  192.168.2.241
                  192.168.2.121
                  192.168.2.242
                  192.168.2.97
                  192.168.2.137
                  192.168.2.96
                  192.168.2.138
                  192.168.2.99
                  192.168.2.135
                  192.168.2.98
                  192.168.2.136
                  192.168.2.139
                  192.168.2.250
                  192.168.2.130
                  192.168.2.251
                  192.168.2.91
                  192.168.2.90
                  192.168.2.93
                  192.168.2.133
                  192.168.2.254
                  192.168.2.92
                  192.168.2.134
                  192.168.2.95
                  192.168.2.131
                  192.168.2.252
                  192.168.2.94
                  192.168.2.132
                  192.168.2.253
                  192.168.2.104
                  192.168.2.225
                  192.168.2.105
                  192.168.2.226
                  192.168.2.102
                  192.168.2.223
                  192.168.2.103
                  192.168.2.224
                  192.168.2.108
                  192.168.2.229
                  192.168.2.109
                  192.168.2.106
                  192.168.2.227
                  192.168.2.107
                  192.168.2.228
                  192.168.2.100
                  192.168.2.221
                  192.168.2.101
                  192.168.2.222
                  192.168.2.220
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1591287
                  Start date and time:2025-01-14 21:15:20 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 53s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:16
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:FjSrGs0AE2.dll
                  renamed because original name is a hash value
                  Original Sample Name:879d69d4c18d6947f9ea5e545ac16d01.dll
                  Detection:MAL
                  Classification:mal100.rans.expl.evad.winDLL@20/3@0/100
                  EGA Information:
                  • Successful, ratio: 66.7%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .dll
                  • Stop behavior analysis, all processes terminated
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 2.16.168.102, 2.16.168.117, 52.165.164.15, 20.3.187.198
                  • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target tasksche.exe, PID 3684 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  15:16:20API Interceptor1x Sleep call for process: loaddll32.exe modified
                  15:16:53API Interceptor112x Sleep call for process: mssecsvc.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bg.microsoft.map.fastly.netjgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                  • 199.232.214.172
                  logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                  • 199.232.214.172
                  DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  WZ6RvDzQeq.exeGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  ea354192.pdfGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
                  • 199.232.210.172
                  2.ps1Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                  • 199.232.214.172
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  MICROSOFT-CORP-MSN-AS-BLOCKUSmlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                  • 13.103.137.252
                  mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                  • 52.252.59.4
                  6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                  • 21.20.144.1
                  XML-702.msiGet hashmaliciousAteraAgentBrowse
                  • 20.60.197.1
                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                  • 20.207.221.18
                  DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 20.190.159.75
                  MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                  • 13.69.116.109
                  Message.emlGet hashmaliciousHTMLPhisherBrowse
                  • 52.109.32.97
                  http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                  • 13.107.246.40
                  MICROSOFT-CORP-MSN-AS-BLOCKUSmlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                  • 13.103.137.252
                  mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                  • 52.252.59.4
                  6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                  • 21.20.144.1
                  XML-702.msiGet hashmaliciousAteraAgentBrowse
                  • 20.60.197.1
                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                  • 20.207.221.18
                  DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 20.190.159.75
                  MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                  • 13.69.116.109
                  Message.emlGet hashmaliciousHTMLPhisherBrowse
                  • 52.109.32.97
                  http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                  • 13.107.246.40
                  LEVEL3USeIZi481eP6.dllGet hashmaliciousWannacryBrowse
                  • 7.224.74.1
                  mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                  • 7.204.138.1
                  jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                  • 4.163.94.1
                  6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                  • 4.143.32.1
                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                  • 4.78.223.133
                  meth10.elfGet hashmaliciousMiraiBrowse
                  • 9.193.50.113
                  meth3.elfGet hashmaliciousMiraiBrowse
                  • 8.249.142.22
                  meth8.elfGet hashmaliciousMiraiBrowse
                  • 9.131.242.2
                  meth1.elfGet hashmaliciousMiraiBrowse
                  • 9.84.90.253
                  arm4.elfGet hashmaliciousUnknownBrowse
                  • 9.16.130.211
                  No context
                  No context
                  Process:C:\Windows\mssecsvc.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3514368
                  Entropy (8bit):7.566722207956314
                  Encrypted:false
                  SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEcaEae:QqPoBhz1aRxcSUDk36SAEdhvxWa9P5N
                  MD5:962D4291A5DFAC935CA1EFF9B1E21D62
                  SHA1:4F68907DEB3CBFEEB5133C44F12AE58D1C20B338
                  SHA-256:82D3AABBFF37889695657E40FD52E38159757B7F909426D1A4A4657F48DD3C5C
                  SHA-512:6BBF39169CEAD50FDB9A5CE872CE73607627C05C5F5A040545F5C733FF2D45A4C33F54A4E2D33CAD36B9D083110E947BA23D979AB570FC0917436B9E87C7F627
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 97%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\rundll32.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3723264
                  Entropy (8bit):7.519031099574924
                  Encrypted:false
                  SSDEEP:49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEcaEaS:Z8qPoBhz1aRxcSUDk36SAEdhvxWa9P5h
                  MD5:EC7E7FF1E52FA99EAC7DD069B2EC9C4A
                  SHA1:F1B70FF3565A26F125477614E7B06E95249CF36D
                  SHA-256:77AC253CEE17F31EA7D8B99030F303E4CBB432F4687320C589E3A442652D9CEC
                  SHA-512:C6D970A1B5D761A3AAE68DBC3640882927C619ACE26A3655D9F44214D7A7371A9B75BAF6D5E9C34C57E0655C42A5998AC44874866BE70D4A577357B374691985
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                  • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 93%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\mssecsvc.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3514368
                  Entropy (8bit):7.566722207956314
                  Encrypted:false
                  SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEcaEae:QqPoBhz1aRxcSUDk36SAEdhvxWa9P5N
                  MD5:962D4291A5DFAC935CA1EFF9B1E21D62
                  SHA1:4F68907DEB3CBFEEB5133C44F12AE58D1C20B338
                  SHA-256:82D3AABBFF37889695657E40FD52E38159757B7F909426D1A4A4657F48DD3C5C
                  SHA-512:6BBF39169CEAD50FDB9A5CE872CE73607627C05C5F5A040545F5C733FF2D45A4C33F54A4E2D33CAD36B9D083110E947BA23D979AB570FC0917436B9E87C7F627
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 97%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.900643138532244
                  TrID:
                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                  • Generic Win/DOS Executable (2004/3) 0.20%
                  • DOS Executable Generic (2002/1) 0.20%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:FjSrGs0AE2.dll
                  File size:5'267'459 bytes
                  MD5:879d69d4c18d6947f9ea5e545ac16d01
                  SHA1:f1d32258bf2dba1c54b3c040fba34be4a8deb2cb
                  SHA256:e55ff68c216152b45e9e2a900cc584907c16bfcfdeb5ed6cc83ec227af907661
                  SHA512:34adedd5affa04a12dd133c2c69e90137d67a4d1a2c297a6e905f0bd522b1bb32683f4080a749423e5d36a552e04b989154ff2f9f80c947d57444b7e1d1a92cf
                  SSDEEP:49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEcaEa:d8qPoBhz1aRxcSUDk36SAEdhvxWa9P5
                  TLSH:BD367B13A7EC025AF6F35B39D47664519977BDCA2836D20C10A42A5E0EB3F218CA177F
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                  Icon Hash:7ae282899bbab082
                  Entrypoint:0x100011e9
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x10000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  DLL Characteristics:
                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                  Instruction
                  push ebp
                  mov ebp, esp
                  push ebx
                  mov ebx, dword ptr [ebp+08h]
                  push esi
                  mov esi, dword ptr [ebp+0Ch]
                  push edi
                  mov edi, dword ptr [ebp+10h]
                  test esi, esi
                  jne 00007FA7BCD26A6Bh
                  cmp dword ptr [10003140h], 00000000h
                  jmp 00007FA7BCD26A88h
                  cmp esi, 01h
                  je 00007FA7BCD26A67h
                  cmp esi, 02h
                  jne 00007FA7BCD26A84h
                  mov eax, dword ptr [10003150h]
                  test eax, eax
                  je 00007FA7BCD26A6Bh
                  push edi
                  push esi
                  push ebx
                  call eax
                  test eax, eax
                  je 00007FA7BCD26A6Eh
                  push edi
                  push esi
                  push ebx
                  call 00007FA7BCD2697Ah
                  test eax, eax
                  jne 00007FA7BCD26A66h
                  xor eax, eax
                  jmp 00007FA7BCD26AB0h
                  push edi
                  push esi
                  push ebx
                  call 00007FA7BCD2682Ch
                  cmp esi, 01h
                  mov dword ptr [ebp+0Ch], eax
                  jne 00007FA7BCD26A6Eh
                  test eax, eax
                  jne 00007FA7BCD26A99h
                  push edi
                  push eax
                  push ebx
                  call 00007FA7BCD26956h
                  test esi, esi
                  je 00007FA7BCD26A67h
                  cmp esi, 03h
                  jne 00007FA7BCD26A88h
                  push edi
                  push esi
                  push ebx
                  call 00007FA7BCD26945h
                  test eax, eax
                  jne 00007FA7BCD26A65h
                  and dword ptr [ebp+0Ch], eax
                  cmp dword ptr [ebp+0Ch], 00000000h
                  je 00007FA7BCD26A73h
                  mov eax, dword ptr [10003150h]
                  test eax, eax
                  je 00007FA7BCD26A6Ah
                  push edi
                  push esi
                  push ebx
                  call eax
                  mov dword ptr [ebp+0Ch], eax
                  mov eax, dword ptr [ebp+0Ch]
                  pop edi
                  pop esi
                  pop ebx
                  pop ebp
                  retn 000Ch
                  jmp dword ptr [10002028h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  Programming Language:
                  • [ C ] VS98 (6.0) build 8168
                  • [C++] VS98 (6.0) build 8168
                  • [RES] VS98 (6.0) cvtres build 1720
                  • [LNK] VS98 (6.0) imp/exp build 8168
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x40000x5000600x50100048dca99bcced2d8544df29e4e5a1c7bdunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  W0x40600x500000dataEnglishUnited States0.8770351409912109
                  DLLImport
                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                  NameOrdinalAddress
                  PlayGame10x10001114
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 14, 2025 21:16:11.935343981 CET49671443192.168.2.8204.79.197.203
                  Jan 14, 2025 21:16:12.263493061 CET4967780192.168.2.8192.229.211.108
                  Jan 14, 2025 21:16:12.451004028 CET49673443192.168.2.823.206.229.226
                  Jan 14, 2025 21:16:12.654186964 CET49672443192.168.2.823.206.229.226
                  Jan 14, 2025 21:16:20.143944979 CET49705445192.168.2.8222.152.143.196
                  Jan 14, 2025 21:16:20.148941994 CET44549705222.152.143.196192.168.2.8
                  Jan 14, 2025 21:16:20.149178982 CET49705445192.168.2.8222.152.143.196
                  Jan 14, 2025 21:16:20.149178982 CET49705445192.168.2.8222.152.143.196
                  Jan 14, 2025 21:16:20.149657011 CET49706445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.154252052 CET44549705222.152.143.196192.168.2.8
                  Jan 14, 2025 21:16:20.154499054 CET44549706222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:20.154596090 CET49705445192.168.2.8222.152.143.196
                  Jan 14, 2025 21:16:20.154643059 CET49706445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.155630112 CET49706445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.160434961 CET44549706222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:20.161257982 CET49706445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.166130066 CET49707445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.171080112 CET44549707222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:20.174304008 CET49707445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.203048944 CET49707445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:20.207860947 CET44549707222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:20.279341936 CET49676443192.168.2.852.182.143.211
                  Jan 14, 2025 21:16:22.060344934 CET49673443192.168.2.823.206.229.226
                  Jan 14, 2025 21:16:22.098083019 CET49728445192.168.2.8149.218.236.111
                  Jan 14, 2025 21:16:22.102917910 CET44549728149.218.236.111192.168.2.8
                  Jan 14, 2025 21:16:22.103076935 CET49728445192.168.2.8149.218.236.111
                  Jan 14, 2025 21:16:22.103318930 CET49729445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.103332996 CET49728445192.168.2.8149.218.236.111
                  Jan 14, 2025 21:16:22.108150005 CET44549729149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:22.108279943 CET44549728149.218.236.111192.168.2.8
                  Jan 14, 2025 21:16:22.108283043 CET49729445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.108376980 CET49729445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.108750105 CET44549728149.218.236.111192.168.2.8
                  Jan 14, 2025 21:16:22.108813047 CET49728445192.168.2.8149.218.236.111
                  Jan 14, 2025 21:16:22.110630035 CET49730445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.113658905 CET44549729149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:22.113746881 CET49729445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.115467072 CET44549730149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:22.115641117 CET49730445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.115691900 CET49730445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:22.120465040 CET44549730149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:22.263545036 CET49672443192.168.2.823.206.229.226
                  Jan 14, 2025 21:16:22.888484001 CET4967780192.168.2.8192.229.211.108
                  Jan 14, 2025 21:16:23.935744047 CET4434970423.206.229.226192.168.2.8
                  Jan 14, 2025 21:16:23.935823917 CET49704443192.168.2.823.206.229.226
                  Jan 14, 2025 21:16:24.109004974 CET49752445192.168.2.8175.120.236.230
                  Jan 14, 2025 21:16:24.113835096 CET44549752175.120.236.230192.168.2.8
                  Jan 14, 2025 21:16:24.113900900 CET49752445192.168.2.8175.120.236.230
                  Jan 14, 2025 21:16:24.113964081 CET49752445192.168.2.8175.120.236.230
                  Jan 14, 2025 21:16:24.114183903 CET49753445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.119036913 CET44549753175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:24.119093895 CET49753445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.119204044 CET49753445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.119292021 CET44549752175.120.236.230192.168.2.8
                  Jan 14, 2025 21:16:24.119339943 CET49752445192.168.2.8175.120.236.230
                  Jan 14, 2025 21:16:24.120248079 CET49754445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.124017954 CET44549753175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:24.124063969 CET49753445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.125066042 CET44549754175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:24.125128031 CET49754445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.125180960 CET49754445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:24.129915953 CET44549754175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:26.125322104 CET49775445192.168.2.823.102.16.226
                  Jan 14, 2025 21:16:26.131345034 CET4454977523.102.16.226192.168.2.8
                  Jan 14, 2025 21:16:26.131434917 CET49775445192.168.2.823.102.16.226
                  Jan 14, 2025 21:16:26.131460905 CET49775445192.168.2.823.102.16.226
                  Jan 14, 2025 21:16:26.131625891 CET49776445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.136392117 CET4454977523.102.16.226192.168.2.8
                  Jan 14, 2025 21:16:26.136554956 CET4454977623.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:26.136565924 CET4454977523.102.16.226192.168.2.8
                  Jan 14, 2025 21:16:26.136615038 CET49775445192.168.2.823.102.16.226
                  Jan 14, 2025 21:16:26.136632919 CET49776445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.136744976 CET49776445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.137892008 CET49777445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.142153978 CET4454977623.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:26.142218113 CET49776445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.143260002 CET4454977723.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:26.143322945 CET49777445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.143373013 CET49777445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:26.148168087 CET4454977723.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:28.184835911 CET49799445192.168.2.893.1.228.229
                  Jan 14, 2025 21:16:28.189739943 CET4454979993.1.228.229192.168.2.8
                  Jan 14, 2025 21:16:28.189826012 CET49799445192.168.2.893.1.228.229
                  Jan 14, 2025 21:16:28.189867973 CET49799445192.168.2.893.1.228.229
                  Jan 14, 2025 21:16:28.190124989 CET49800445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.194825888 CET4454979993.1.228.229192.168.2.8
                  Jan 14, 2025 21:16:28.194884062 CET49799445192.168.2.893.1.228.229
                  Jan 14, 2025 21:16:28.194926023 CET4454980093.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:28.194987059 CET49800445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.195079088 CET49800445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.199594021 CET49802445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.200134039 CET4454980093.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:28.200186968 CET49800445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.204381943 CET4454980293.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:28.204467058 CET49802445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.204499960 CET49802445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:28.209299088 CET4454980293.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:30.156618118 CET49824445192.168.2.895.98.32.111
                  Jan 14, 2025 21:16:30.162168980 CET4454982495.98.32.111192.168.2.8
                  Jan 14, 2025 21:16:30.163423061 CET49824445192.168.2.895.98.32.111
                  Jan 14, 2025 21:16:30.163480997 CET49824445192.168.2.895.98.32.111
                  Jan 14, 2025 21:16:30.163804054 CET49825445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.168309927 CET4454982495.98.32.111192.168.2.8
                  Jan 14, 2025 21:16:30.168634892 CET4454982595.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:30.168770075 CET49825445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.168770075 CET49825445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.168998003 CET4454982495.98.32.111192.168.2.8
                  Jan 14, 2025 21:16:30.169079065 CET49824445192.168.2.895.98.32.111
                  Jan 14, 2025 21:16:30.170663118 CET49826445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.173896074 CET4454982595.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:30.173979998 CET49825445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.175466061 CET4454982695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:30.175535917 CET49826445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.175595045 CET49826445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:30.180422068 CET4454982695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:31.845782995 CET4454982695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:31.848433971 CET49826445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:31.848521948 CET49826445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:31.848573923 CET49826445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:31.853399992 CET4454982695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:31.853410006 CET4454982695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:32.170680046 CET49848445192.168.2.8150.120.222.244
                  Jan 14, 2025 21:16:32.175633907 CET44549848150.120.222.244192.168.2.8
                  Jan 14, 2025 21:16:32.175801039 CET49848445192.168.2.8150.120.222.244
                  Jan 14, 2025 21:16:32.175801039 CET49848445192.168.2.8150.120.222.244
                  Jan 14, 2025 21:16:32.176055908 CET49849445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.180757046 CET44549848150.120.222.244192.168.2.8
                  Jan 14, 2025 21:16:32.180833101 CET44549849150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:32.180923939 CET49849445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.181018114 CET49849445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.181317091 CET49848445192.168.2.8150.120.222.244
                  Jan 14, 2025 21:16:32.181402922 CET49850445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.185935020 CET44549849150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:32.186007023 CET49849445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.186204910 CET44549850150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:32.186275959 CET49850445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.186316013 CET49850445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:32.191119909 CET44549850150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:34.185950041 CET49876445192.168.2.8212.77.71.242
                  Jan 14, 2025 21:16:34.190769911 CET44549876212.77.71.242192.168.2.8
                  Jan 14, 2025 21:16:34.190839052 CET49876445192.168.2.8212.77.71.242
                  Jan 14, 2025 21:16:34.190861940 CET49876445192.168.2.8212.77.71.242
                  Jan 14, 2025 21:16:34.191015005 CET49877445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.195858002 CET44549876212.77.71.242192.168.2.8
                  Jan 14, 2025 21:16:34.195872068 CET44549877212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:34.195914984 CET49876445192.168.2.8212.77.71.242
                  Jan 14, 2025 21:16:34.195949078 CET49877445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.196027040 CET49877445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.196252108 CET49878445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.200967073 CET44549877212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:34.201005936 CET49877445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.201035023 CET44549878212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:34.201096058 CET49878445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.201363087 CET49878445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:34.206135035 CET44549878212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:34.857587099 CET49886445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:34.862514973 CET4454988695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:34.862591982 CET49886445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:34.862670898 CET49886445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:34.867460012 CET4454988695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:36.201529026 CET49901445192.168.2.856.235.86.224
                  Jan 14, 2025 21:16:36.206556082 CET4454990156.235.86.224192.168.2.8
                  Jan 14, 2025 21:16:36.206687927 CET49901445192.168.2.856.235.86.224
                  Jan 14, 2025 21:16:36.206720114 CET49901445192.168.2.856.235.86.224
                  Jan 14, 2025 21:16:36.206902981 CET49902445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.211639881 CET4454990156.235.86.224192.168.2.8
                  Jan 14, 2025 21:16:36.211704969 CET4454990256.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:36.211743116 CET49901445192.168.2.856.235.86.224
                  Jan 14, 2025 21:16:36.211785078 CET49902445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.211860895 CET49902445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.212148905 CET49903445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.216721058 CET4454990256.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:36.216775894 CET49902445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.216914892 CET4454990356.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:36.216983080 CET49903445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.217042923 CET49903445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:36.221781969 CET4454990356.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:36.497565985 CET4454988695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:36.497626066 CET49886445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:36.497664928 CET49886445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:36.497776985 CET49886445192.168.2.895.98.32.1
                  Jan 14, 2025 21:16:36.502523899 CET4454988695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:36.502607107 CET4454988695.98.32.1192.168.2.8
                  Jan 14, 2025 21:16:36.560982943 CET49908445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.565915108 CET4454990895.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:36.566175938 CET49908445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.566194057 CET49908445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.566524982 CET49909445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.571347952 CET4454990995.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:36.571414948 CET49909445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.571435928 CET49909445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.571918964 CET4454990895.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:36.571975946 CET49908445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:36.576210976 CET4454990995.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:38.217183113 CET49927445192.168.2.8113.149.90.161
                  Jan 14, 2025 21:16:38.222011089 CET44549927113.149.90.161192.168.2.8
                  Jan 14, 2025 21:16:38.222096920 CET49927445192.168.2.8113.149.90.161
                  Jan 14, 2025 21:16:38.225481987 CET49927445192.168.2.8113.149.90.161
                  Jan 14, 2025 21:16:38.225615978 CET49928445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.230438948 CET44549927113.149.90.161192.168.2.8
                  Jan 14, 2025 21:16:38.230448961 CET44549928113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:38.230495930 CET49927445192.168.2.8113.149.90.161
                  Jan 14, 2025 21:16:38.230530024 CET49928445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.233783007 CET49928445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.234174013 CET49929445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.238631010 CET44549928113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:38.238696098 CET49928445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.238989115 CET44549929113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:38.239044905 CET49929445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.242099047 CET49929445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:38.246860027 CET44549929113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:40.232860088 CET49952445192.168.2.8101.212.173.155
                  Jan 14, 2025 21:16:40.237678051 CET44549952101.212.173.155192.168.2.8
                  Jan 14, 2025 21:16:40.237761021 CET49952445192.168.2.8101.212.173.155
                  Jan 14, 2025 21:16:40.237793922 CET49952445192.168.2.8101.212.173.155
                  Jan 14, 2025 21:16:40.237993002 CET49953445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.242711067 CET44549952101.212.173.155192.168.2.8
                  Jan 14, 2025 21:16:40.242727041 CET44549953101.212.173.1192.168.2.8
                  Jan 14, 2025 21:16:40.242763042 CET49952445192.168.2.8101.212.173.155
                  Jan 14, 2025 21:16:40.242816925 CET49953445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.242913008 CET49953445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.243341923 CET49954445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.248172998 CET44549954101.212.173.1192.168.2.8
                  Jan 14, 2025 21:16:40.248235941 CET49954445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.248255014 CET49954445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.248291969 CET44549953101.212.173.1192.168.2.8
                  Jan 14, 2025 21:16:40.248585939 CET44549953101.212.173.1192.168.2.8
                  Jan 14, 2025 21:16:40.248634100 CET49953445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:16:40.253041983 CET44549954101.212.173.1192.168.2.8
                  Jan 14, 2025 21:16:41.534367085 CET44549707222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:41.534621000 CET49707445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:41.534710884 CET49707445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:41.534813881 CET49707445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:41.539505959 CET44549707222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:41.539618015 CET44549707222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:42.248678923 CET49976445192.168.2.872.220.215.249
                  Jan 14, 2025 21:16:42.253550053 CET4454997672.220.215.249192.168.2.8
                  Jan 14, 2025 21:16:42.253643036 CET49976445192.168.2.872.220.215.249
                  Jan 14, 2025 21:16:42.253680944 CET49976445192.168.2.872.220.215.249
                  Jan 14, 2025 21:16:42.253906965 CET49977445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.258749008 CET4454997772.220.215.1192.168.2.8
                  Jan 14, 2025 21:16:42.258824110 CET49977445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.258934975 CET49977445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.259032965 CET4454997672.220.215.249192.168.2.8
                  Jan 14, 2025 21:16:42.259093046 CET49976445192.168.2.872.220.215.249
                  Jan 14, 2025 21:16:42.259387016 CET49978445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.264055014 CET4454997772.220.215.1192.168.2.8
                  Jan 14, 2025 21:16:42.264115095 CET49977445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.264260054 CET4454997872.220.215.1192.168.2.8
                  Jan 14, 2025 21:16:42.264334917 CET49978445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.264377117 CET49978445192.168.2.872.220.215.1
                  Jan 14, 2025 21:16:42.269166946 CET4454997872.220.215.1192.168.2.8
                  Jan 14, 2025 21:16:43.508068085 CET44549730149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:43.508311033 CET49730445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:43.508311033 CET49730445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:43.508430958 CET49730445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:43.513209105 CET44549730149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:43.513220072 CET44549730149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:44.264620066 CET50001445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.269776106 CET44550001162.134.142.1192.168.2.8
                  Jan 14, 2025 21:16:44.269963026 CET50001445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.269963026 CET50001445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.270148039 CET50002445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.275108099 CET44550002162.134.142.1192.168.2.8
                  Jan 14, 2025 21:16:44.275125980 CET44550001162.134.142.1192.168.2.8
                  Jan 14, 2025 21:16:44.275207043 CET50002445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.275208950 CET50001445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.275321960 CET50002445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.275665045 CET50003445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.280188084 CET44550002162.134.142.1192.168.2.8
                  Jan 14, 2025 21:16:44.280236006 CET50002445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.280426025 CET44550003162.134.142.1192.168.2.8
                  Jan 14, 2025 21:16:44.280482054 CET50003445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.280610085 CET50003445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:16:44.285516977 CET44550003162.134.142.1192.168.2.8
                  Jan 14, 2025 21:16:44.545233965 CET50007445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:44.550239086 CET44550007222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:44.550312996 CET50007445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:44.550388098 CET50007445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:16:44.555236101 CET44550007222.152.143.1192.168.2.8
                  Jan 14, 2025 21:16:45.487571955 CET44549754175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:45.488429070 CET49754445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:45.488429070 CET49754445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:45.488826990 CET49754445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:45.493237972 CET44549754175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:45.493613958 CET44549754175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:46.279968023 CET50009445192.168.2.850.45.187.251
                  Jan 14, 2025 21:16:46.285940886 CET4455000950.45.187.251192.168.2.8
                  Jan 14, 2025 21:16:46.286079884 CET50009445192.168.2.850.45.187.251
                  Jan 14, 2025 21:16:46.286079884 CET50009445192.168.2.850.45.187.251
                  Jan 14, 2025 21:16:46.286277056 CET50010445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.291169882 CET4455001050.45.187.1192.168.2.8
                  Jan 14, 2025 21:16:46.291271925 CET50010445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.291299105 CET50010445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.291584969 CET50011445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.292314053 CET4455000950.45.187.251192.168.2.8
                  Jan 14, 2025 21:16:46.296358109 CET4455001050.45.187.1192.168.2.8
                  Jan 14, 2025 21:16:46.296400070 CET4455001150.45.187.1192.168.2.8
                  Jan 14, 2025 21:16:46.296468973 CET50011445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.296489954 CET50011445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.301425934 CET4455001150.45.187.1192.168.2.8
                  Jan 14, 2025 21:16:46.316728115 CET4455000950.45.187.251192.168.2.8
                  Jan 14, 2025 21:16:46.316813946 CET50009445192.168.2.850.45.187.251
                  Jan 14, 2025 21:16:46.317135096 CET4455001050.45.187.1192.168.2.8
                  Jan 14, 2025 21:16:46.317279100 CET50010445192.168.2.850.45.187.1
                  Jan 14, 2025 21:16:46.513803005 CET50012445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:46.518672943 CET44550012149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:46.518750906 CET50012445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:46.518819094 CET50012445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:16:46.523655891 CET44550012149.218.236.1192.168.2.8
                  Jan 14, 2025 21:16:47.553595066 CET4454977723.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:47.556466103 CET49777445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:47.556541920 CET49777445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:47.556798935 CET49777445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:47.561392069 CET4454977723.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:47.561570883 CET4454977723.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:48.295408964 CET50013445192.168.2.851.243.90.42
                  Jan 14, 2025 21:16:48.300282955 CET4455001351.243.90.42192.168.2.8
                  Jan 14, 2025 21:16:48.300374985 CET50013445192.168.2.851.243.90.42
                  Jan 14, 2025 21:16:48.300410986 CET50013445192.168.2.851.243.90.42
                  Jan 14, 2025 21:16:48.300615072 CET50014445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.305625916 CET4455001451.243.90.1192.168.2.8
                  Jan 14, 2025 21:16:48.305744886 CET50014445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.305991888 CET50014445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.306440115 CET50015445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.308330059 CET4455001351.243.90.42192.168.2.8
                  Jan 14, 2025 21:16:48.311256886 CET4455001551.243.90.1192.168.2.8
                  Jan 14, 2025 21:16:48.311336994 CET50015445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.311336994 CET50015445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.312287092 CET4455001451.243.90.1192.168.2.8
                  Jan 14, 2025 21:16:48.316148043 CET4455001551.243.90.1192.168.2.8
                  Jan 14, 2025 21:16:48.316618919 CET4455001351.243.90.42192.168.2.8
                  Jan 14, 2025 21:16:48.316668034 CET50013445192.168.2.851.243.90.42
                  Jan 14, 2025 21:16:48.317011118 CET4455001451.243.90.1192.168.2.8
                  Jan 14, 2025 21:16:48.317071915 CET50014445192.168.2.851.243.90.1
                  Jan 14, 2025 21:16:48.498451948 CET50016445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:48.503341913 CET44550016175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:48.503452063 CET50016445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:48.503499031 CET50016445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:16:48.508225918 CET44550016175.120.236.1192.168.2.8
                  Jan 14, 2025 21:16:49.597846031 CET4454980293.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:49.597987890 CET49802445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:49.598074913 CET49802445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:49.598181963 CET49802445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:49.602873087 CET4454980293.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:49.602893114 CET4454980293.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:50.311069012 CET50017445192.168.2.871.151.168.156
                  Jan 14, 2025 21:16:50.315973997 CET4455001771.151.168.156192.168.2.8
                  Jan 14, 2025 21:16:50.316111088 CET50017445192.168.2.871.151.168.156
                  Jan 14, 2025 21:16:50.316154003 CET50017445192.168.2.871.151.168.156
                  Jan 14, 2025 21:16:50.316397905 CET50018445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.321254969 CET4455001771.151.168.156192.168.2.8
                  Jan 14, 2025 21:16:50.321266890 CET4455001871.151.168.1192.168.2.8
                  Jan 14, 2025 21:16:50.321322918 CET50017445192.168.2.871.151.168.156
                  Jan 14, 2025 21:16:50.321355104 CET50018445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.321491003 CET50018445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.321779966 CET50019445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.326359987 CET4455001871.151.168.1192.168.2.8
                  Jan 14, 2025 21:16:50.326443911 CET50018445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.326642036 CET4455001971.151.168.1192.168.2.8
                  Jan 14, 2025 21:16:50.326699972 CET50019445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.326745033 CET50019445192.168.2.871.151.168.1
                  Jan 14, 2025 21:16:50.331513882 CET4455001971.151.168.1192.168.2.8
                  Jan 14, 2025 21:16:50.561024904 CET50020445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:50.565948963 CET4455002023.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:50.566036940 CET50020445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:50.566114902 CET50020445192.168.2.823.102.16.1
                  Jan 14, 2025 21:16:50.570866108 CET4455002023.102.16.1192.168.2.8
                  Jan 14, 2025 21:16:52.394925117 CET50021445192.168.2.839.230.197.2
                  Jan 14, 2025 21:16:52.399785995 CET4455002139.230.197.2192.168.2.8
                  Jan 14, 2025 21:16:52.400969028 CET50021445192.168.2.839.230.197.2
                  Jan 14, 2025 21:16:52.401065111 CET50021445192.168.2.839.230.197.2
                  Jan 14, 2025 21:16:52.401221991 CET50022445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.406296015 CET4455002239.230.197.1192.168.2.8
                  Jan 14, 2025 21:16:52.406366110 CET50022445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.407170057 CET4455002139.230.197.2192.168.2.8
                  Jan 14, 2025 21:16:52.410211086 CET50021445192.168.2.839.230.197.2
                  Jan 14, 2025 21:16:52.410386086 CET50022445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.414784908 CET50023445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.415240049 CET4455002239.230.197.1192.168.2.8
                  Jan 14, 2025 21:16:52.415329933 CET50022445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.419610023 CET4455002339.230.197.1192.168.2.8
                  Jan 14, 2025 21:16:52.422225952 CET50023445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.423335075 CET50023445192.168.2.839.230.197.1
                  Jan 14, 2025 21:16:52.428101063 CET4455002339.230.197.1192.168.2.8
                  Jan 14, 2025 21:16:52.610999107 CET50024445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:52.615853071 CET4455002493.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:52.616372108 CET50024445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:52.619116068 CET50024445192.168.2.893.1.228.1
                  Jan 14, 2025 21:16:52.623930931 CET4455002493.1.228.1192.168.2.8
                  Jan 14, 2025 21:16:53.568563938 CET44549850150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:53.568691969 CET49850445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:53.568734884 CET49850445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:53.568803072 CET49850445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:53.575939894 CET44549850150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:53.575956106 CET44549850150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:54.389262915 CET50025445192.168.2.822.184.197.116
                  Jan 14, 2025 21:16:54.394196033 CET4455002522.184.197.116192.168.2.8
                  Jan 14, 2025 21:16:54.394325972 CET50025445192.168.2.822.184.197.116
                  Jan 14, 2025 21:16:54.394325972 CET50025445192.168.2.822.184.197.116
                  Jan 14, 2025 21:16:54.394614935 CET50026445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.399427891 CET4455002522.184.197.116192.168.2.8
                  Jan 14, 2025 21:16:54.399442911 CET4455002622.184.197.1192.168.2.8
                  Jan 14, 2025 21:16:54.399570942 CET50026445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.399697065 CET50026445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.399699926 CET50025445192.168.2.822.184.197.116
                  Jan 14, 2025 21:16:54.399986982 CET50027445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.405091047 CET4455002722.184.197.1192.168.2.8
                  Jan 14, 2025 21:16:54.405164003 CET50027445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.405188084 CET50027445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.405278921 CET4455002622.184.197.1192.168.2.8
                  Jan 14, 2025 21:16:54.405334949 CET50026445192.168.2.822.184.197.1
                  Jan 14, 2025 21:16:54.410033941 CET4455002722.184.197.1192.168.2.8
                  Jan 14, 2025 21:16:55.582124949 CET44549878212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:55.582252979 CET49878445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:55.582252979 CET49878445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:55.583328962 CET49878445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:55.587548018 CET44549878212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:55.588377953 CET44549878212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:56.264046907 CET50028445192.168.2.86.20.56.177
                  Jan 14, 2025 21:16:56.269938946 CET445500286.20.56.177192.168.2.8
                  Jan 14, 2025 21:16:56.270021915 CET50028445192.168.2.86.20.56.177
                  Jan 14, 2025 21:16:56.270056963 CET50028445192.168.2.86.20.56.177
                  Jan 14, 2025 21:16:56.270224094 CET50029445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.275233030 CET445500296.20.56.1192.168.2.8
                  Jan 14, 2025 21:16:56.275301933 CET50029445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.275341988 CET50029445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.275352955 CET445500286.20.56.177192.168.2.8
                  Jan 14, 2025 21:16:56.275646925 CET50030445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.275679111 CET50028445192.168.2.86.20.56.177
                  Jan 14, 2025 21:16:56.281847000 CET445500296.20.56.1192.168.2.8
                  Jan 14, 2025 21:16:56.281896114 CET50029445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.282165051 CET445500306.20.56.1192.168.2.8
                  Jan 14, 2025 21:16:56.282380104 CET50030445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.282380104 CET50030445192.168.2.86.20.56.1
                  Jan 14, 2025 21:16:56.287275076 CET445500306.20.56.1192.168.2.8
                  Jan 14, 2025 21:16:56.576277971 CET50031445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:56.581300974 CET44550031150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:56.581463099 CET50031445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:56.581535101 CET50031445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:16:56.586266994 CET44550031150.120.222.1192.168.2.8
                  Jan 14, 2025 21:16:57.613481998 CET4454990356.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:57.613579988 CET49903445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:57.613624096 CET49903445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:57.613681078 CET49903445192.168.2.856.235.86.1
                  Jan 14, 2025 21:16:57.618504047 CET4454990356.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:57.618519068 CET4454990356.235.86.1192.168.2.8
                  Jan 14, 2025 21:16:57.976874113 CET4454990995.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:57.980106115 CET49909445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:57.980144978 CET49909445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:57.980190039 CET49909445192.168.2.895.98.32.2
                  Jan 14, 2025 21:16:57.985042095 CET4454990995.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:57.985057116 CET4454990995.98.32.2192.168.2.8
                  Jan 14, 2025 21:16:58.014138937 CET50032445192.168.2.8207.66.116.21
                  Jan 14, 2025 21:16:58.019129992 CET44550032207.66.116.21192.168.2.8
                  Jan 14, 2025 21:16:58.019774914 CET50032445192.168.2.8207.66.116.21
                  Jan 14, 2025 21:16:58.019851923 CET50032445192.168.2.8207.66.116.21
                  Jan 14, 2025 21:16:58.019999027 CET50033445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.024931908 CET44550032207.66.116.21192.168.2.8
                  Jan 14, 2025 21:16:58.024981022 CET44550033207.66.116.1192.168.2.8
                  Jan 14, 2025 21:16:58.025046110 CET50032445192.168.2.8207.66.116.21
                  Jan 14, 2025 21:16:58.025083065 CET50033445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.025147915 CET50033445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.025413036 CET50034445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.030234098 CET44550034207.66.116.1192.168.2.8
                  Jan 14, 2025 21:16:58.030457973 CET44550033207.66.116.1192.168.2.8
                  Jan 14, 2025 21:16:58.030544996 CET50033445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.030570984 CET50034445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.030570984 CET50034445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:16:58.035415888 CET44550034207.66.116.1192.168.2.8
                  Jan 14, 2025 21:16:58.591911077 CET50035445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:58.596765995 CET44550035212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:58.596832991 CET50035445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:58.596901894 CET50035445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:16:58.601669073 CET44550035212.77.71.1192.168.2.8
                  Jan 14, 2025 21:16:59.612621069 CET44549929113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:59.612695932 CET49929445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:59.612766027 CET49929445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:59.612788916 CET49929445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:16:59.617620945 CET44549929113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:59.617656946 CET44549929113.149.90.1192.168.2.8
                  Jan 14, 2025 21:16:59.654731989 CET50036445192.168.2.8157.134.120.121
                  Jan 14, 2025 21:16:59.659692049 CET44550036157.134.120.121192.168.2.8
                  Jan 14, 2025 21:16:59.659769058 CET50036445192.168.2.8157.134.120.121
                  Jan 14, 2025 21:16:59.659862995 CET50036445192.168.2.8157.134.120.121
                  Jan 14, 2025 21:16:59.660012007 CET50037445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.664915085 CET44550037157.134.120.1192.168.2.8
                  Jan 14, 2025 21:16:59.664947987 CET44550036157.134.120.121192.168.2.8
                  Jan 14, 2025 21:16:59.664979935 CET50037445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.665018082 CET50037445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.665020943 CET50036445192.168.2.8157.134.120.121
                  Jan 14, 2025 21:16:59.665313005 CET50038445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.670011044 CET44550037157.134.120.1192.168.2.8
                  Jan 14, 2025 21:16:59.670063019 CET50037445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.670155048 CET44550038157.134.120.1192.168.2.8
                  Jan 14, 2025 21:16:59.670236111 CET50038445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.670269966 CET50038445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:16:59.675183058 CET44550038157.134.120.1192.168.2.8
                  Jan 14, 2025 21:17:00.623136044 CET50039445192.168.2.856.235.86.1
                  Jan 14, 2025 21:17:00.628108978 CET4455003956.235.86.1192.168.2.8
                  Jan 14, 2025 21:17:00.628212929 CET50039445192.168.2.856.235.86.1
                  Jan 14, 2025 21:17:00.628232956 CET50039445192.168.2.856.235.86.1
                  Jan 14, 2025 21:17:00.633136988 CET4455003956.235.86.1192.168.2.8
                  Jan 14, 2025 21:17:00.982630968 CET50040445192.168.2.895.98.32.2
                  Jan 14, 2025 21:17:00.988379955 CET4455004095.98.32.2192.168.2.8
                  Jan 14, 2025 21:17:00.988471985 CET50040445192.168.2.895.98.32.2
                  Jan 14, 2025 21:17:00.988679886 CET50040445192.168.2.895.98.32.2
                  Jan 14, 2025 21:17:00.994467974 CET4455004095.98.32.2192.168.2.8
                  Jan 14, 2025 21:17:01.186342955 CET50041445192.168.2.897.21.71.165
                  Jan 14, 2025 21:17:01.366408110 CET4455004197.21.71.165192.168.2.8
                  Jan 14, 2025 21:17:01.366525888 CET50041445192.168.2.897.21.71.165
                  Jan 14, 2025 21:17:01.366626978 CET50041445192.168.2.897.21.71.165
                  Jan 14, 2025 21:17:01.366842031 CET50042445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.371607065 CET4455004297.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:01.371684074 CET50042445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.371742964 CET50042445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.372181892 CET4455004197.21.71.165192.168.2.8
                  Jan 14, 2025 21:17:01.372235060 CET50041445192.168.2.897.21.71.165
                  Jan 14, 2025 21:17:01.373370886 CET50043445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.376714945 CET4455004297.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:01.376768112 CET50042445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.378287077 CET4455004397.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:01.378362894 CET50043445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.378401995 CET50043445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:01.383263111 CET4455004397.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:01.628011942 CET44549954101.212.173.1192.168.2.8
                  Jan 14, 2025 21:17:01.628086090 CET49954445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:01.628160954 CET49954445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:01.628254890 CET49954445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:01.632989883 CET44549954101.212.173.1192.168.2.8
                  Jan 14, 2025 21:17:01.633048058 CET44549954101.212.173.1192.168.2.8
                  Jan 14, 2025 21:17:02.608097076 CET50044445192.168.2.872.64.182.9
                  Jan 14, 2025 21:17:02.612981081 CET4455004472.64.182.9192.168.2.8
                  Jan 14, 2025 21:17:02.616544008 CET50044445192.168.2.872.64.182.9
                  Jan 14, 2025 21:17:02.616544008 CET50044445192.168.2.872.64.182.9
                  Jan 14, 2025 21:17:02.616841078 CET50045445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.621685982 CET4455004572.64.182.1192.168.2.8
                  Jan 14, 2025 21:17:02.621718884 CET4455004472.64.182.9192.168.2.8
                  Jan 14, 2025 21:17:02.621797085 CET50044445192.168.2.872.64.182.9
                  Jan 14, 2025 21:17:02.621808052 CET50045445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.621890068 CET50045445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.622278929 CET50046445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.623650074 CET50047445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:17:02.626826048 CET4455004572.64.182.1192.168.2.8
                  Jan 14, 2025 21:17:02.627087116 CET4455004672.64.182.1192.168.2.8
                  Jan 14, 2025 21:17:02.627146006 CET50045445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.627170086 CET50046445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.627223015 CET50046445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:02.628479004 CET44550047113.149.90.1192.168.2.8
                  Jan 14, 2025 21:17:02.631970882 CET4455004672.64.182.1192.168.2.8
                  Jan 14, 2025 21:17:02.632035971 CET50047445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:17:02.632071972 CET50047445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:17:02.636893988 CET44550047113.149.90.1192.168.2.8
                  Jan 14, 2025 21:17:03.629395008 CET4454997872.220.215.1192.168.2.8
                  Jan 14, 2025 21:17:03.629468918 CET49978445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:03.629511118 CET49978445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:03.629568100 CET49978445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:03.634414911 CET4454997872.220.215.1192.168.2.8
                  Jan 14, 2025 21:17:03.634428978 CET4454997872.220.215.1192.168.2.8
                  Jan 14, 2025 21:17:03.951349974 CET50048445192.168.2.8133.177.250.238
                  Jan 14, 2025 21:17:03.956248045 CET44550048133.177.250.238192.168.2.8
                  Jan 14, 2025 21:17:03.956309080 CET50048445192.168.2.8133.177.250.238
                  Jan 14, 2025 21:17:03.960432053 CET50048445192.168.2.8133.177.250.238
                  Jan 14, 2025 21:17:03.960597038 CET50049445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:03.965204000 CET44550048133.177.250.238192.168.2.8
                  Jan 14, 2025 21:17:03.965379000 CET44550049133.177.250.1192.168.2.8
                  Jan 14, 2025 21:17:03.965425014 CET50048445192.168.2.8133.177.250.238
                  Jan 14, 2025 21:17:03.965452909 CET50049445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:03.969371080 CET50049445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:03.974194050 CET44550049133.177.250.1192.168.2.8
                  Jan 14, 2025 21:17:03.976438046 CET50049445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:04.097758055 CET50050445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:04.102951050 CET44550050133.177.250.1192.168.2.8
                  Jan 14, 2025 21:17:04.103044033 CET50050445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:04.103133917 CET50050445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:04.107994080 CET44550050133.177.250.1192.168.2.8
                  Jan 14, 2025 21:17:04.638780117 CET50051445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:04.643994093 CET44550051101.212.173.1192.168.2.8
                  Jan 14, 2025 21:17:04.644109011 CET50051445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:04.644144058 CET50051445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:04.648976088 CET44550051101.212.173.1192.168.2.8
                  Jan 14, 2025 21:17:05.185960054 CET50052445192.168.2.820.196.19.187
                  Jan 14, 2025 21:17:05.191076994 CET4455005220.196.19.187192.168.2.8
                  Jan 14, 2025 21:17:05.191154003 CET50052445192.168.2.820.196.19.187
                  Jan 14, 2025 21:17:05.191184998 CET50052445192.168.2.820.196.19.187
                  Jan 14, 2025 21:17:05.191359997 CET50053445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.196336031 CET4455005320.196.19.1192.168.2.8
                  Jan 14, 2025 21:17:05.196402073 CET4455005220.196.19.187192.168.2.8
                  Jan 14, 2025 21:17:05.196403980 CET50053445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.196444035 CET50053445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.196743965 CET50054445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.198940039 CET4455005220.196.19.187192.168.2.8
                  Jan 14, 2025 21:17:05.198996067 CET50052445192.168.2.820.196.19.187
                  Jan 14, 2025 21:17:05.201452017 CET4455005320.196.19.1192.168.2.8
                  Jan 14, 2025 21:17:05.201625109 CET50053445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.201642036 CET4455005420.196.19.1192.168.2.8
                  Jan 14, 2025 21:17:05.201760054 CET50054445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.201812983 CET50054445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:05.206639051 CET4455005420.196.19.1192.168.2.8
                  Jan 14, 2025 21:17:05.664551973 CET44550003162.134.142.1192.168.2.8
                  Jan 14, 2025 21:17:05.671344995 CET50003445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:05.671344995 CET50003445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:05.671344995 CET50003445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:05.676393032 CET44550003162.134.142.1192.168.2.8
                  Jan 14, 2025 21:17:05.676407099 CET44550003162.134.142.1192.168.2.8
                  Jan 14, 2025 21:17:05.940013885 CET44550007222.152.143.1192.168.2.8
                  Jan 14, 2025 21:17:05.940349102 CET50007445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:17:05.940398932 CET50007445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:17:05.940484047 CET50007445192.168.2.8222.152.143.1
                  Jan 14, 2025 21:17:05.945158005 CET44550007222.152.143.1192.168.2.8
                  Jan 14, 2025 21:17:05.945233107 CET44550007222.152.143.1192.168.2.8
                  Jan 14, 2025 21:17:05.998450994 CET50055445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.003640890 CET44550055222.152.143.2192.168.2.8
                  Jan 14, 2025 21:17:06.003753901 CET50055445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.003820896 CET50055445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.004146099 CET50056445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.008821011 CET44550055222.152.143.2192.168.2.8
                  Jan 14, 2025 21:17:06.008899927 CET50055445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.008934975 CET44550056222.152.143.2192.168.2.8
                  Jan 14, 2025 21:17:06.008984089 CET50056445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.009022951 CET50056445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:06.013766050 CET44550056222.152.143.2192.168.2.8
                  Jan 14, 2025 21:17:06.342247009 CET50057445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.347189903 CET44550057145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.347304106 CET50057445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.347357035 CET50057445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.347604990 CET50058445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.352340937 CET44550057145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.352435112 CET44550057145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.352448940 CET44550058145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.352488041 CET50057445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.352515936 CET50058445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.352583885 CET50058445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.352861881 CET50059445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.357532024 CET44550058145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.357606888 CET50058445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.357672930 CET44550059145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.358231068 CET50059445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.358264923 CET50059445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:06.363106966 CET44550059145.213.56.1192.168.2.8
                  Jan 14, 2025 21:17:06.638726950 CET50060445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:06.643883944 CET4455006072.220.215.1192.168.2.8
                  Jan 14, 2025 21:17:06.644212961 CET50060445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:06.644252062 CET50060445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:06.649133921 CET4455006072.220.215.1192.168.2.8
                  Jan 14, 2025 21:17:07.420502901 CET50061445192.168.2.831.64.80.35
                  Jan 14, 2025 21:17:07.425695896 CET4455006131.64.80.35192.168.2.8
                  Jan 14, 2025 21:17:07.425786018 CET50061445192.168.2.831.64.80.35
                  Jan 14, 2025 21:17:07.425864935 CET50061445192.168.2.831.64.80.35
                  Jan 14, 2025 21:17:07.426067114 CET50062445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.430970907 CET4455006231.64.80.1192.168.2.8
                  Jan 14, 2025 21:17:07.431066036 CET50062445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.431092978 CET50062445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.431117058 CET4455006131.64.80.35192.168.2.8
                  Jan 14, 2025 21:17:07.431174994 CET50061445192.168.2.831.64.80.35
                  Jan 14, 2025 21:17:07.431418896 CET50063445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.436162949 CET4455006231.64.80.1192.168.2.8
                  Jan 14, 2025 21:17:07.436224937 CET50062445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.436321974 CET4455006331.64.80.1192.168.2.8
                  Jan 14, 2025 21:17:07.436383963 CET50063445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.436430931 CET50063445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:07.441265106 CET4455006331.64.80.1192.168.2.8
                  Jan 14, 2025 21:17:07.658909082 CET4455001150.45.187.1192.168.2.8
                  Jan 14, 2025 21:17:07.659142017 CET50011445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:07.659142017 CET50011445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:07.659142017 CET50011445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:07.664060116 CET4455001150.45.187.1192.168.2.8
                  Jan 14, 2025 21:17:07.664078951 CET4455001150.45.187.1192.168.2.8
                  Jan 14, 2025 21:17:07.877638102 CET44550012149.218.236.1192.168.2.8
                  Jan 14, 2025 21:17:07.878246069 CET50012445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:17:07.878304005 CET50012445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:17:07.878369093 CET50012445192.168.2.8149.218.236.1
                  Jan 14, 2025 21:17:07.883135080 CET44550012149.218.236.1192.168.2.8
                  Jan 14, 2025 21:17:07.883147955 CET44550012149.218.236.1192.168.2.8
                  Jan 14, 2025 21:17:07.935828924 CET50064445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.940946102 CET44550064149.218.236.2192.168.2.8
                  Jan 14, 2025 21:17:07.941112041 CET50064445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.941112041 CET50064445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.941535950 CET50065445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.946286917 CET44550064149.218.236.2192.168.2.8
                  Jan 14, 2025 21:17:07.946398020 CET50064445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.946522951 CET44550065149.218.236.2192.168.2.8
                  Jan 14, 2025 21:17:07.946590900 CET50065445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.946634054 CET50065445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:07.951558113 CET44550065149.218.236.2192.168.2.8
                  Jan 14, 2025 21:17:08.436077118 CET50066445192.168.2.861.3.159.211
                  Jan 14, 2025 21:17:08.441267014 CET4455006661.3.159.211192.168.2.8
                  Jan 14, 2025 21:17:08.441346884 CET50066445192.168.2.861.3.159.211
                  Jan 14, 2025 21:17:08.441514015 CET50066445192.168.2.861.3.159.211
                  Jan 14, 2025 21:17:08.441565037 CET50067445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.446434975 CET4455006761.3.159.1192.168.2.8
                  Jan 14, 2025 21:17:08.446547031 CET50067445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.446574926 CET4455006661.3.159.211192.168.2.8
                  Jan 14, 2025 21:17:08.446577072 CET50067445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.446731091 CET50066445192.168.2.861.3.159.211
                  Jan 14, 2025 21:17:08.446888924 CET50068445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.451594114 CET4455006761.3.159.1192.168.2.8
                  Jan 14, 2025 21:17:08.451680899 CET4455006861.3.159.1192.168.2.8
                  Jan 14, 2025 21:17:08.451729059 CET50067445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.451754093 CET50068445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.451805115 CET50068445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:08.456562042 CET4455006861.3.159.1192.168.2.8
                  Jan 14, 2025 21:17:08.685803890 CET50069445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:08.690785885 CET44550069162.134.142.1192.168.2.8
                  Jan 14, 2025 21:17:08.694276094 CET50069445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:08.694304943 CET50069445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:08.699163914 CET44550069162.134.142.1192.168.2.8
                  Jan 14, 2025 21:17:09.373562098 CET50070445192.168.2.8159.1.77.167
                  Jan 14, 2025 21:17:09.378529072 CET44550070159.1.77.167192.168.2.8
                  Jan 14, 2025 21:17:09.378622055 CET50070445192.168.2.8159.1.77.167
                  Jan 14, 2025 21:17:09.378659010 CET50070445192.168.2.8159.1.77.167
                  Jan 14, 2025 21:17:09.378758907 CET50071445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.383732080 CET44550071159.1.77.1192.168.2.8
                  Jan 14, 2025 21:17:09.383810043 CET50071445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.383830070 CET50071445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.384239912 CET50072445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.386120081 CET44550070159.1.77.167192.168.2.8
                  Jan 14, 2025 21:17:09.386248112 CET50070445192.168.2.8159.1.77.167
                  Jan 14, 2025 21:17:09.389127016 CET44550072159.1.77.1192.168.2.8
                  Jan 14, 2025 21:17:09.389247894 CET50072445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.389285088 CET50072445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.394181967 CET44550072159.1.77.1192.168.2.8
                  Jan 14, 2025 21:17:09.394999981 CET44550071159.1.77.1192.168.2.8
                  Jan 14, 2025 21:17:09.395091057 CET50071445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:09.694087982 CET4455001551.243.90.1192.168.2.8
                  Jan 14, 2025 21:17:09.694236040 CET50015445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:09.694320917 CET50015445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:09.694418907 CET50015445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:09.699088097 CET4455001551.243.90.1192.168.2.8
                  Jan 14, 2025 21:17:09.699151039 CET4455001551.243.90.1192.168.2.8
                  Jan 14, 2025 21:17:09.878154993 CET44550016175.120.236.1192.168.2.8
                  Jan 14, 2025 21:17:09.878465891 CET50016445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:17:09.878465891 CET50016445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:17:09.878465891 CET50016445192.168.2.8175.120.236.1
                  Jan 14, 2025 21:17:09.883419037 CET44550016175.120.236.1192.168.2.8
                  Jan 14, 2025 21:17:09.883431911 CET44550016175.120.236.1192.168.2.8
                  Jan 14, 2025 21:17:09.935749054 CET50073445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.940711021 CET44550073175.120.236.2192.168.2.8
                  Jan 14, 2025 21:17:09.940819025 CET50073445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.940819025 CET50073445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.941194057 CET50074445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.946008921 CET44550074175.120.236.2192.168.2.8
                  Jan 14, 2025 21:17:09.946042061 CET44550073175.120.236.2192.168.2.8
                  Jan 14, 2025 21:17:09.946074963 CET50074445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.946100950 CET50074445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.946111917 CET50073445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:09.950918913 CET44550074175.120.236.2192.168.2.8
                  Jan 14, 2025 21:17:10.248570919 CET50075445192.168.2.8163.101.91.9
                  Jan 14, 2025 21:17:10.253655910 CET44550075163.101.91.9192.168.2.8
                  Jan 14, 2025 21:17:10.253773928 CET50075445192.168.2.8163.101.91.9
                  Jan 14, 2025 21:17:10.258371115 CET50075445192.168.2.8163.101.91.9
                  Jan 14, 2025 21:17:10.258722067 CET50076445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.263420105 CET44550075163.101.91.9192.168.2.8
                  Jan 14, 2025 21:17:10.263501883 CET50075445192.168.2.8163.101.91.9
                  Jan 14, 2025 21:17:10.263624907 CET44550076163.101.91.1192.168.2.8
                  Jan 14, 2025 21:17:10.263696909 CET50076445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.263772964 CET50076445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.264261961 CET50077445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.268685102 CET44550076163.101.91.1192.168.2.8
                  Jan 14, 2025 21:17:10.268769026 CET50076445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.269129992 CET44550077163.101.91.1192.168.2.8
                  Jan 14, 2025 21:17:10.269196987 CET50077445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.269232035 CET50077445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:10.274097919 CET44550077163.101.91.1192.168.2.8
                  Jan 14, 2025 21:17:10.670033932 CET50079445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:10.674973965 CET4455007950.45.187.1192.168.2.8
                  Jan 14, 2025 21:17:10.675049067 CET50079445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:10.675091982 CET50079445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:10.679953098 CET4455007950.45.187.1192.168.2.8
                  Jan 14, 2025 21:17:11.076663971 CET50080445192.168.2.885.53.67.56
                  Jan 14, 2025 21:17:11.081831932 CET4455008085.53.67.56192.168.2.8
                  Jan 14, 2025 21:17:11.081955910 CET50080445192.168.2.885.53.67.56
                  Jan 14, 2025 21:17:11.081973076 CET50080445192.168.2.885.53.67.56
                  Jan 14, 2025 21:17:11.082098007 CET50081445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.087013960 CET4455008185.53.67.1192.168.2.8
                  Jan 14, 2025 21:17:11.087104082 CET50081445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.087104082 CET50081445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.087574959 CET50082445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.088233948 CET4455008085.53.67.56192.168.2.8
                  Jan 14, 2025 21:17:11.088293076 CET50080445192.168.2.885.53.67.56
                  Jan 14, 2025 21:17:11.092320919 CET4455008185.53.67.1192.168.2.8
                  Jan 14, 2025 21:17:11.092391014 CET50081445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.092463017 CET4455008285.53.67.1192.168.2.8
                  Jan 14, 2025 21:17:11.092525959 CET50082445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.092571020 CET50082445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:11.097371101 CET4455008285.53.67.1192.168.2.8
                  Jan 14, 2025 21:17:11.692136049 CET4455001971.151.168.1192.168.2.8
                  Jan 14, 2025 21:17:11.692213058 CET50019445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:11.692243099 CET50019445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:11.692287922 CET50019445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:11.697180033 CET4455001971.151.168.1192.168.2.8
                  Jan 14, 2025 21:17:11.697210073 CET4455001971.151.168.1192.168.2.8
                  Jan 14, 2025 21:17:11.842266083 CET50083445192.168.2.8124.12.57.10
                  Jan 14, 2025 21:17:11.847223997 CET44550083124.12.57.10192.168.2.8
                  Jan 14, 2025 21:17:11.847310066 CET50083445192.168.2.8124.12.57.10
                  Jan 14, 2025 21:17:11.847352028 CET50083445192.168.2.8124.12.57.10
                  Jan 14, 2025 21:17:11.847528934 CET50084445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.852349997 CET44550084124.12.57.1192.168.2.8
                  Jan 14, 2025 21:17:11.852386951 CET44550083124.12.57.10192.168.2.8
                  Jan 14, 2025 21:17:11.852432966 CET50084445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.852477074 CET50083445192.168.2.8124.12.57.10
                  Jan 14, 2025 21:17:11.852582932 CET50084445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.852936029 CET50085445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.857503891 CET44550084124.12.57.1192.168.2.8
                  Jan 14, 2025 21:17:11.857692957 CET50084445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.857863903 CET44550085124.12.57.1192.168.2.8
                  Jan 14, 2025 21:17:11.857953072 CET50085445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.857975006 CET50085445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:11.862875938 CET44550085124.12.57.1192.168.2.8
                  Jan 14, 2025 21:17:11.941945076 CET4455002023.102.16.1192.168.2.8
                  Jan 14, 2025 21:17:11.942013979 CET50020445192.168.2.823.102.16.1
                  Jan 14, 2025 21:17:11.942075968 CET50020445192.168.2.823.102.16.1
                  Jan 14, 2025 21:17:11.942141056 CET50020445192.168.2.823.102.16.1
                  Jan 14, 2025 21:17:11.946923971 CET4455002023.102.16.1192.168.2.8
                  Jan 14, 2025 21:17:11.946935892 CET4455002023.102.16.1192.168.2.8
                  Jan 14, 2025 21:17:12.007145882 CET50086445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.012049913 CET4455008623.102.16.2192.168.2.8
                  Jan 14, 2025 21:17:12.012120008 CET50086445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.012219906 CET50086445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.014543056 CET50087445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.017076015 CET4455008623.102.16.2192.168.2.8
                  Jan 14, 2025 21:17:12.017127037 CET50086445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.019387007 CET4455008723.102.16.2192.168.2.8
                  Jan 14, 2025 21:17:12.019465923 CET50087445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.019597054 CET50087445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:12.024347067 CET4455008723.102.16.2192.168.2.8
                  Jan 14, 2025 21:17:12.781976938 CET50089445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:12.786870003 CET4455008951.243.90.1192.168.2.8
                  Jan 14, 2025 21:17:12.786941051 CET50089445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:12.789513111 CET50089445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:12.794364929 CET4455008951.243.90.1192.168.2.8
                  Jan 14, 2025 21:17:13.820858955 CET4455002339.230.197.1192.168.2.8
                  Jan 14, 2025 21:17:13.820931911 CET50023445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:13.820962906 CET50023445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:13.821011066 CET50023445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:13.825794935 CET4455002339.230.197.1192.168.2.8
                  Jan 14, 2025 21:17:13.825808048 CET4455002339.230.197.1192.168.2.8
                  Jan 14, 2025 21:17:14.006685972 CET4455002493.1.228.1192.168.2.8
                  Jan 14, 2025 21:17:14.006767035 CET50024445192.168.2.893.1.228.1
                  Jan 14, 2025 21:17:14.006819963 CET50024445192.168.2.893.1.228.1
                  Jan 14, 2025 21:17:14.006884098 CET50024445192.168.2.893.1.228.1
                  Jan 14, 2025 21:17:14.011730909 CET4455002493.1.228.1192.168.2.8
                  Jan 14, 2025 21:17:14.011764050 CET4455002493.1.228.1192.168.2.8
                  Jan 14, 2025 21:17:14.061182976 CET50093445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.066250086 CET4455009393.1.228.2192.168.2.8
                  Jan 14, 2025 21:17:14.066359997 CET50093445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.066387892 CET50093445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.066751957 CET50094445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.071369886 CET4455009393.1.228.2192.168.2.8
                  Jan 14, 2025 21:17:14.071436882 CET50093445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.071645021 CET4455009493.1.228.2192.168.2.8
                  Jan 14, 2025 21:17:14.071737051 CET50094445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.071759939 CET50094445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:14.076639891 CET4455009493.1.228.2192.168.2.8
                  Jan 14, 2025 21:17:14.701248884 CET50097445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:14.706521988 CET4455009771.151.168.1192.168.2.8
                  Jan 14, 2025 21:17:14.708872080 CET50097445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:14.712594032 CET50097445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:14.717425108 CET4455009771.151.168.1192.168.2.8
                  Jan 14, 2025 21:17:15.768563032 CET4455002722.184.197.1192.168.2.8
                  Jan 14, 2025 21:17:15.768627882 CET50027445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:15.768666983 CET50027445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:15.768695116 CET50027445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:15.773503065 CET4455002722.184.197.1192.168.2.8
                  Jan 14, 2025 21:17:15.773514986 CET4455002722.184.197.1192.168.2.8
                  Jan 14, 2025 21:17:16.826309919 CET50112445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:16.831209898 CET4455011239.230.197.1192.168.2.8
                  Jan 14, 2025 21:17:16.831301928 CET50112445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:16.831330061 CET50112445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:16.836108923 CET4455011239.230.197.1192.168.2.8
                  Jan 14, 2025 21:17:17.628535032 CET445500306.20.56.1192.168.2.8
                  Jan 14, 2025 21:17:17.628607035 CET50030445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:17.628684998 CET50030445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:17.628684998 CET50030445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:17.633874893 CET445500306.20.56.1192.168.2.8
                  Jan 14, 2025 21:17:17.633886099 CET445500306.20.56.1192.168.2.8
                  Jan 14, 2025 21:17:17.940392017 CET44550031150.120.222.1192.168.2.8
                  Jan 14, 2025 21:17:17.940612078 CET50031445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:17:17.940701008 CET50031445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:17:17.940701008 CET50031445192.168.2.8150.120.222.1
                  Jan 14, 2025 21:17:17.945621014 CET44550031150.120.222.1192.168.2.8
                  Jan 14, 2025 21:17:17.945632935 CET44550031150.120.222.1192.168.2.8
                  Jan 14, 2025 21:17:17.998502970 CET50126445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.003891945 CET44550126150.120.222.2192.168.2.8
                  Jan 14, 2025 21:17:18.003967047 CET50126445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.003992081 CET50126445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.004348993 CET50127445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.009191990 CET44550127150.120.222.2192.168.2.8
                  Jan 14, 2025 21:17:18.009252071 CET50127445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.009279966 CET50127445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.009497881 CET44550126150.120.222.2192.168.2.8
                  Jan 14, 2025 21:17:18.009563923 CET50126445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:18.014086962 CET44550127150.120.222.2192.168.2.8
                  Jan 14, 2025 21:17:18.779413939 CET50137445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:18.784311056 CET4455013722.184.197.1192.168.2.8
                  Jan 14, 2025 21:17:18.784408092 CET50137445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:18.784468889 CET50137445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:18.789385080 CET4455013722.184.197.1192.168.2.8
                  Jan 14, 2025 21:17:19.410989046 CET44550034207.66.116.1192.168.2.8
                  Jan 14, 2025 21:17:19.411158085 CET50034445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:19.411200047 CET50034445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:19.411252975 CET50034445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:19.416064024 CET44550034207.66.116.1192.168.2.8
                  Jan 14, 2025 21:17:19.416074991 CET44550034207.66.116.1192.168.2.8
                  Jan 14, 2025 21:17:19.971724987 CET44550035212.77.71.1192.168.2.8
                  Jan 14, 2025 21:17:19.971786976 CET50035445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:17:19.971824884 CET50035445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:17:19.971843958 CET50035445192.168.2.8212.77.71.1
                  Jan 14, 2025 21:17:19.976643085 CET44550035212.77.71.1192.168.2.8
                  Jan 14, 2025 21:17:19.976672888 CET44550035212.77.71.1192.168.2.8
                  Jan 14, 2025 21:17:20.029793978 CET50160445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.034689903 CET44550160212.77.71.2192.168.2.8
                  Jan 14, 2025 21:17:20.034781933 CET50160445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.039084911 CET50160445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.039858103 CET50162445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.044301033 CET44550160212.77.71.2192.168.2.8
                  Jan 14, 2025 21:17:20.044604063 CET44550162212.77.71.2192.168.2.8
                  Jan 14, 2025 21:17:20.044666052 CET50162445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.044706106 CET50162445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.045644045 CET44550160212.77.71.2192.168.2.8
                  Jan 14, 2025 21:17:20.045685053 CET50160445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:20.049556971 CET44550162212.77.71.2192.168.2.8
                  Jan 14, 2025 21:17:20.638777971 CET50177445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:20.643961906 CET445501776.20.56.1192.168.2.8
                  Jan 14, 2025 21:17:20.644037008 CET50177445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:20.644078016 CET50177445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:20.648863077 CET445501776.20.56.1192.168.2.8
                  Jan 14, 2025 21:17:21.052320957 CET44550038157.134.120.1192.168.2.8
                  Jan 14, 2025 21:17:21.052500963 CET50038445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:17:21.052501917 CET50038445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:17:21.052687883 CET50038445192.168.2.8157.134.120.1
                  Jan 14, 2025 21:17:21.057374954 CET44550038157.134.120.1192.168.2.8
                  Jan 14, 2025 21:17:21.057472944 CET44550038157.134.120.1192.168.2.8
                  Jan 14, 2025 21:17:22.006624937 CET4455003956.235.86.1192.168.2.8
                  Jan 14, 2025 21:17:22.006700993 CET50039445192.168.2.856.235.86.1
                  Jan 14, 2025 21:17:22.006740093 CET50039445192.168.2.856.235.86.1
                  Jan 14, 2025 21:17:22.006757975 CET50039445192.168.2.856.235.86.1
                  Jan 14, 2025 21:17:22.011687040 CET4455003956.235.86.1192.168.2.8
                  Jan 14, 2025 21:17:22.011696100 CET4455003956.235.86.1192.168.2.8
                  Jan 14, 2025 21:17:22.060780048 CET50221445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.065718889 CET4455022156.235.86.2192.168.2.8
                  Jan 14, 2025 21:17:22.065809965 CET50221445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.065874100 CET50221445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.066169024 CET50222445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.070878983 CET4455022156.235.86.2192.168.2.8
                  Jan 14, 2025 21:17:22.070960045 CET4455022256.235.86.2192.168.2.8
                  Jan 14, 2025 21:17:22.071012020 CET50221445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.071042061 CET50222445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.071079016 CET50222445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:22.075792074 CET4455022256.235.86.2192.168.2.8
                  Jan 14, 2025 21:17:22.367446899 CET4455004095.98.32.2192.168.2.8
                  Jan 14, 2025 21:17:22.367579937 CET50040445192.168.2.895.98.32.2
                  Jan 14, 2025 21:17:22.367628098 CET50040445192.168.2.895.98.32.2
                  Jan 14, 2025 21:17:22.367629051 CET50040445192.168.2.895.98.32.2
                  Jan 14, 2025 21:17:22.372432947 CET4455004095.98.32.2192.168.2.8
                  Jan 14, 2025 21:17:22.372453928 CET4455004095.98.32.2192.168.2.8
                  Jan 14, 2025 21:17:22.420197010 CET50238445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:22.420550108 CET50241445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.425026894 CET44550238207.66.116.1192.168.2.8
                  Jan 14, 2025 21:17:22.425141096 CET50238445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:22.425188065 CET50238445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:22.425697088 CET4455024195.98.32.3192.168.2.8
                  Jan 14, 2025 21:17:22.426270008 CET50241445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.426352978 CET50241445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.426724911 CET50243445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.430129051 CET44550238207.66.116.1192.168.2.8
                  Jan 14, 2025 21:17:22.431232929 CET4455024195.98.32.3192.168.2.8
                  Jan 14, 2025 21:17:22.431302071 CET50241445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.431519032 CET4455024395.98.32.3192.168.2.8
                  Jan 14, 2025 21:17:22.434371948 CET50243445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.434371948 CET50243445192.168.2.895.98.32.3
                  Jan 14, 2025 21:17:22.439193010 CET4455024395.98.32.3192.168.2.8
                  Jan 14, 2025 21:17:22.753084898 CET4455004397.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:22.753175974 CET50043445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:22.753175974 CET50043445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:22.753273010 CET50043445192.168.2.897.21.71.1
                  Jan 14, 2025 21:17:22.758241892 CET4455004397.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:22.758254051 CET4455004397.21.71.1192.168.2.8
                  Jan 14, 2025 21:17:24.003704071 CET4455004672.64.182.1192.168.2.8
                  Jan 14, 2025 21:17:24.003787041 CET50046445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:24.006747961 CET44550047113.149.90.1192.168.2.8
                  Jan 14, 2025 21:17:24.006800890 CET50047445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:17:24.592534065 CET50056445192.168.2.8222.152.143.2
                  Jan 14, 2025 21:17:24.592633009 CET50094445192.168.2.893.1.228.2
                  Jan 14, 2025 21:17:24.592756033 CET50074445192.168.2.8175.120.236.2
                  Jan 14, 2025 21:17:24.592756033 CET50065445192.168.2.8149.218.236.2
                  Jan 14, 2025 21:17:24.592762947 CET50046445192.168.2.872.64.182.1
                  Jan 14, 2025 21:17:24.592809916 CET50127445192.168.2.8150.120.222.2
                  Jan 14, 2025 21:17:24.592905998 CET50238445192.168.2.8207.66.116.1
                  Jan 14, 2025 21:17:24.592971087 CET50047445192.168.2.8113.149.90.1
                  Jan 14, 2025 21:17:24.593002081 CET50051445192.168.2.8101.212.173.1
                  Jan 14, 2025 21:17:24.593050003 CET50050445192.168.2.8133.177.250.1
                  Jan 14, 2025 21:17:24.593054056 CET50054445192.168.2.820.196.19.1
                  Jan 14, 2025 21:17:24.593067884 CET50059445192.168.2.8145.213.56.1
                  Jan 14, 2025 21:17:24.593148947 CET50072445192.168.2.8159.1.77.1
                  Jan 14, 2025 21:17:24.593151093 CET50068445192.168.2.861.3.159.1
                  Jan 14, 2025 21:17:24.593162060 CET50069445192.168.2.8162.134.142.1
                  Jan 14, 2025 21:17:24.593175888 CET50077445192.168.2.8163.101.91.1
                  Jan 14, 2025 21:17:24.593202114 CET50082445192.168.2.885.53.67.1
                  Jan 14, 2025 21:17:24.593204021 CET50060445192.168.2.872.220.215.1
                  Jan 14, 2025 21:17:24.593204021 CET50063445192.168.2.831.64.80.1
                  Jan 14, 2025 21:17:24.593204021 CET50079445192.168.2.850.45.187.1
                  Jan 14, 2025 21:17:24.593228102 CET50085445192.168.2.8124.12.57.1
                  Jan 14, 2025 21:17:24.593272924 CET50087445192.168.2.823.102.16.2
                  Jan 14, 2025 21:17:24.593297958 CET50097445192.168.2.871.151.168.1
                  Jan 14, 2025 21:17:24.593302011 CET50089445192.168.2.851.243.90.1
                  Jan 14, 2025 21:17:24.593343019 CET50177445192.168.2.86.20.56.1
                  Jan 14, 2025 21:17:24.593425989 CET50137445192.168.2.822.184.197.1
                  Jan 14, 2025 21:17:24.593427896 CET50112445192.168.2.839.230.197.1
                  Jan 14, 2025 21:17:24.593475103 CET50162445192.168.2.8212.77.71.2
                  Jan 14, 2025 21:17:24.593647003 CET50222445192.168.2.856.235.86.2
                  Jan 14, 2025 21:17:24.593719006 CET50243445192.168.2.895.98.32.3
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 14, 2025 21:17:01.103580952 CET138138192.168.2.8192.168.2.255
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 14, 2025 21:16:46.506479979 CET1.1.1.1192.168.2.80x56c4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                  Jan 14, 2025 21:16:46.506479979 CET1.1.1.1192.168.2.80x56c4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:15:16:17
                  Start date:14/01/2025
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll"
                  Imagebase:0xfc0000
                  File size:126'464 bytes
                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:15:16:17
                  Start date:14/01/2025
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6ee680000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:15:16:17
                  Start date:14/01/2025
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1
                  Imagebase:0xa40000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:15:16:17
                  Start date:14/01/2025
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\FjSrGs0AE2.dll,PlayGame
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:15:16:17
                  Start date:14/01/2025
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",#1
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:15:16:17
                  Start date:14/01/2025
                  Path:C:\Windows\mssecsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\WINDOWS\mssecsvc.exe
                  Imagebase:0x400000
                  File size:3'723'264 bytes
                  MD5 hash:EC7E7FF1E52FA99EAC7DD069B2EC9C4A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1443452852.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1443559527.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                  • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 93%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:15:16:18
                  Start date:14/01/2025
                  Path:C:\Windows\mssecsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\WINDOWS\mssecsvc.exe -m security
                  Imagebase:0x400000
                  File size:3'723'264 bytes
                  MD5 hash:EC7E7FF1E52FA99EAC7DD069B2EC9C4A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1450405027.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2088960083.0000000001C3A000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1450711422.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1450711422.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2089287724.0000000002169000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Target ID:9
                  Start time:15:16:19
                  Start date:14/01/2025
                  Path:C:\Windows\tasksche.exe
                  Wow64 process (32bit):false
                  Commandline:C:\WINDOWS\tasksche.exe /i
                  Imagebase:0x400000
                  File size:3'514'368 bytes
                  MD5 hash:962D4291A5DFAC935CA1EFF9B1E21D62
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1459360802.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 97%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:10
                  Start time:15:16:20
                  Start date:14/01/2025
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\FjSrGs0AE2.dll",PlayGame
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:11
                  Start time:15:16:20
                  Start date:14/01/2025
                  Path:C:\Windows\mssecsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\WINDOWS\mssecsvc.exe
                  Imagebase:0x400000
                  File size:3'723'264 bytes
                  MD5 hash:EC7E7FF1E52FA99EAC7DD069B2EC9C4A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1475072164.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1472047250.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1475233025.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1472176887.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1472176887.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Target ID:12
                  Start time:15:16:21
                  Start date:14/01/2025
                  Path:C:\Windows\tasksche.exe
                  Wow64 process (32bit):false
                  Commandline:C:\WINDOWS\tasksche.exe /i
                  Imagebase:0x400000
                  File size:3'514'368 bytes
                  MD5 hash:962D4291A5DFAC935CA1EFF9B1E21D62
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1474050262.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1474497468.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:77.5%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:63.2%
                    Total number of Nodes:38
                    Total number of Limit Nodes:2
                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 97 407c40 sprintf OpenSCManagerA 91->97 93 407f25 102 407ce0 GetModuleHandleW 93->102 96->90 98 407c74 CreateServiceA 97->98 99 407cca 97->99 100 407cbb CloseServiceHandle 98->100 101 407cad StartServiceA CloseServiceHandle 98->101 99->93 100->93 101->100 103 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 102->103 104 407f08 102->104 103->104 105 407d49 103->105 104->79 105->104 106 407d69 FindResourceA 105->106 106->104 107 407d84 LoadResource 106->107 107->104 108 407d94 LockResource 107->108 108->104 109 407da7 SizeofResource 108->109 109->104 110 407db9 sprintf sprintf MoveFileExA CreateFileA 109->110 110->104 111 407e54 WriteFile CloseHandle CreateProcessA 110->111 111->104 112 407ef2 CloseHandle CloseHandle 111->112 112->104

                    Callgraph

                    Control-flow Graph

                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                    • sprintf.MSVCRT ref: 00407E01
                    • sprintf.MSVCRT ref: 00407E18
                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                    • CreateProcessA.KERNELBASE ref: 00407EE8
                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1461282711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.1461262340.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461307690.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461398005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                    • API String ID: 4281112323-1507730452
                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                    Control-flow Graph

                    APIs
                    • sprintf.MSVCRT ref: 00407C56
                    • OpenSCManagerA.SECHOST(00000000,00000000,000F003F), ref: 00407C68
                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1461282711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.1461262340.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461307690.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461398005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                    • API String ID: 3340711343-4063779371
                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.1461282711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.1461262340.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461307690.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461398005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                    • String ID:
                    • API String ID: 801014965-0
                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                    Control-flow Graph

                    APIs
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                    Memory Dump Source
                    • Source File: 00000006.00000002.1461282711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.1461262340.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461307690.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461398005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandleOpen
                    • String ID:
                    • API String ID: 435140893-0
                    • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                    • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                    • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                    • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                    Control-flow Graph

                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                    • __p___argc.MSVCRT ref: 004080A5
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1461282711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.1461262340.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461307690.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461341997.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461398005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.1461483443.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                    • String ID: mssecsvc2.0
                    • API String ID: 4274534310-3729025388
                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                    Execution Graph

                    Execution Coverage:34.8%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:36
                    Total number of Limit Nodes:2

                    Callgraph

                    Control-flow Graph

                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                    • __p___argc.MSVCRT ref: 004080A5
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2087915779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.2087899039.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087931231.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088031253.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088044127.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                    • String ID: mssecsvc2.0
                    • API String ID: 4274534310-3729025388
                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                    Control-flow Graph

                    APIs
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                    Memory Dump Source
                    • Source File: 00000008.00000002.2087915779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.2087899039.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087931231.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088031253.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088044127.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandleOpen
                    • String ID:
                    • API String ID: 435140893-0
                    • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                    • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                    • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                    • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                    Control-flow Graph

                    APIs
                    • sprintf.MSVCRT ref: 00407C56
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2087915779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.2087899039.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087931231.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088031253.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088044127.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                    • API String ID: 3340711343-4063779371
                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                    • sprintf.MSVCRT ref: 00407E01
                    • sprintf.MSVCRT ref: 00407E18
                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2087915779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.2087899039.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087931231.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088031253.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088044127.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                    • API String ID: 4072214828-1507730452
                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.2087915779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.2087899039.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087931231.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2087946115.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088018596.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088031253.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088044127.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000008.00000002.2088203455.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                    • String ID:
                    • API String ID: 801014965-0
                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                    APIs
                    • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: memcpy
                    • String ID: /../$/..\$\../$\..\
                    • API String ID: 3510742995-3885502717
                    • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                    • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                    • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                    • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                    APIs
                    • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                    • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                    • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                    • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                    • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                    • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                    • API String ID: 2238633743-2459060434
                    • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                    • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                    • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                    • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                    APIs
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                    • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandleOpen$ManagerStart
                    • String ID: cmd.exe /c "%s"
                    • API String ID: 1485051382-955883872
                    • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                    • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                    • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                    • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                    • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                    • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrow$memcpy
                    • String ID:
                    • API String ID: 1881450474-3916222277
                    • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                    • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                    • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                    • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                    APIs
                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                    • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                    • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                    • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                    • String ID: WANACRY!
                    • API String ID: 283026544-1240840912
                    • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                    • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                    • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                    • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrowmemcpy
                    • String ID: $Q;@
                    • API String ID: 2382887404-262343263
                    • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                    • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                    • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                    • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrowmemcpy
                    • String ID:
                    • API String ID: 2382887404-3916222277
                    • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                    • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                    • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                    • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                    APIs
                    • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeProcessfree
                    • String ID:
                    • API String ID: 3428986607-0
                    • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                    • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                    • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                    • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrow
                    • String ID:
                    • API String ID: 941485209-0
                    • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                    • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                    • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                    • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrow
                    • String ID:
                    • API String ID: 941485209-0
                    • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                    • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                    • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                    • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: memcpy
                    • String ID:
                    • API String ID: 3510742995-0
                    • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                    • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                    • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                    • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                    APIs
                    • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ContextCryptRelease
                    • String ID:
                    • API String ID: 829835001-0
                    • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                    • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                    • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                    • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                    • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                    • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                    • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                    • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                    • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                    • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                    APIs
                      • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                    • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                    • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                    • API String ID: 2238633743-1294736154
                    • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                    • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                    • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                    • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: %s%s$%s%s%s$:$\
                    • API String ID: 0-1100577047
                    • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                    • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                    • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                    • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                    APIs
                    • __p___argv.MSVCRT(0040F538), ref: 00402040
                    • strcmp.MSVCRT(?), ref: 0040204B
                    • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                    • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                      • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                    • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                    • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                    • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                      • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                      • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                      • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                      • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                    • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                    • API String ID: 1074704982-2844324180
                    • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                    • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                    • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                    • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                    APIs
                    • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                    • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                    • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                    • strlen.MSVCRT(?), ref: 004011A7
                    • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                    • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                    • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                    • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                    • String ID: 0@$Software\$WanaCrypt0r
                    • API String ID: 865909632-3421300005
                    • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                    • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                    • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                    • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                    • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                    • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                    • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                    • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                    • String ID: %s\Intel$%s\ProgramData
                    • API String ID: 3806094219-198707228
                    • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                    • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                    • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                    • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                    APIs
                      • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                    • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                    • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                    • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                      • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                    • SetLastError.KERNEL32(0000045A), ref: 00402430
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                    • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                    • API String ID: 1900561814-3657104962
                    • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                    • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                    • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                    • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                    APIs
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                    • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                    • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Directory$AttributesCreateCurrentFile$swprintf
                    • String ID: %s\%s
                    • API String ID: 1036847564-4073750446
                    • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                    • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                    • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                    • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                    APIs
                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                    • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                    • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                    • CloseHandle.KERNEL32(?), ref: 004010EC
                    • CloseHandle.KERNEL32(?), ref: 004010F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                    • String ID: D
                    • API String ID: 786732093-2746444292
                    • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                    • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                    • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                    • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                    APIs
                    • __set_app_type.MSVCRT(00000002), ref: 004077E7
                    • __p__fmode.MSVCRT ref: 004077FC
                    • __p__commode.MSVCRT ref: 0040780A
                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                    • String ID:
                    • API String ID: 3626615345-0
                    • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                    • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                    • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                    • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                    APIs
                    • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                      • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                    • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                    • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                    • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                    • String ID:
                    • API String ID: 2141228402-0
                    • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                    • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                    • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                    • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                    APIs
                    • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                    • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                    • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Read$realloc
                    • String ID: ?!@
                    • API String ID: 1241503663-708128716
                    • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                    • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                    • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                    • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: rand$wcslen$ComputerNamesrand
                    • String ID:
                    • API String ID: 3058258771-0
                    • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                    • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                    • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                    • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                    APIs
                    • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                    • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                    • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                    • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                    • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                    • String ID:
                    • API String ID: 2935503933-0
                    • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                    • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                    • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                    • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                    APIs
                    • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                    • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                    • Sleep.KERNEL32(000003E8), ref: 00401F40
                    • CloseHandle.KERNEL32(00000000), ref: 00401F52
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleMutexOpenSleepsprintf
                    • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                    • API String ID: 2780352083-2959021817
                    • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                    • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                    • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                    • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrowmemcpy
                    • String ID:
                    • API String ID: 2382887404-0
                    • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                    • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                    • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                    • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                    APIs
                    • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                    • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                    • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                    • fclose.MSVCRT(00000000), ref: 00401058
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: fclosefopenfreadfwrite
                    • String ID: c.wnry
                    • API String ID: 4000964834-3240288721
                    • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                    • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                    • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                    • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                    APIs
                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                    • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                    • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                    • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                    • String ID:
                    • API String ID: 2811923685-0
                    • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                    • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                    • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                    • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                    APIs
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Pointer$??2@Create
                    • String ID:
                    • API String ID: 1331958074-0
                    • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                    • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                    • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                    • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                    APIs
                    • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                    • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_stricmp
                    • String ID: P!@
                    • API String ID: 1278613211-1774101457
                    • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                    • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                    • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                    • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                    APIs
                    • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                    • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFilestrcmp
                    • String ID: c.wnry
                    • API String ID: 3324900478-3240288721
                    • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                    • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                    • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                    • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                    APIs
                    • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                    • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??3@CloseHandle
                    • String ID: $l@
                    • API String ID: 3816424416-2140230165
                    • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                    • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                    • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                    • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                    APIs
                    • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                    • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                    Memory Dump Source
                    • Source File: 00000009.00000002.1460065475.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000009.00000002.1460014599.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460100707.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460207093.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000009.00000002.1460269948.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$Leave$Entermemcpy
                    • String ID:
                    • API String ID: 3435569088-0
                    • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                    • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                    • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                    • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65