Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9kNjKSEUym.dll

Overview

General Information

Sample name:9kNjKSEUym.dll
renamed because original name is a hash value
Original sample name:978fcc48a006c05c94e626ccb2ddfe53.dll
Analysis ID:1591517
MD5:978fcc48a006c05c94e626ccb2ddfe53
SHA1:ed08574fc15f536656610e6f71c1384b3be5df02
SHA256:706d780689c904b92e1797614b91f557b1b261e71dc17076a28f3a87f13c6bf6
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7304 cmdline: loaddll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7356 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7380 cmdline: rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7368 cmdline: rundll32.exe C:\Users\user\Desktop\9kNjKSEUym.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7440 cmdline: C:\WINDOWS\mssecsvc.exe MD5: CF96DFB043DDC2C720A67DC71F5B2DA2)
        • tasksche.exe (PID: 7640 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 075929751841BBC9E4DAF155A1C78630)
    • rundll32.exe (PID: 7672 cmdline: rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7692 cmdline: C:\WINDOWS\mssecsvc.exe MD5: CF96DFB043DDC2C720A67DC71F5B2DA2)
        • tasksche.exe (PID: 7764 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 075929751841BBC9E4DAF155A1C78630)
  • mssecsvc.exe (PID: 7536 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: CF96DFB043DDC2C720A67DC71F5B2DA2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
9kNjKSEUym.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    9kNjKSEUym.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    9kNjKSEUym.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x32e44:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x32e6c:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          0000000C.00000002.1416734616.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          8.2.mssecsvc.exe.1eae084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          8.2.mssecsvc.exe.23d08c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          8.2.mssecsvc.exe.240296c.7.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            8.2.mssecsvc.exe.240296c.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xf4d8:$x3: tasksche.exe
            • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xf52c:$x5: WNcry@2ol7
            • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xf42c:$s3: cmd.exe /c "%s"
            • 0x41980:$s4: msg/m_portuguese.wnry
            • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            8.2.mssecsvc.exe.240296c.7.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 135 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:29.098572+010020315153Misc activity104.16.166.22880192.168.2.749737TCP
            2025-01-15T02:52:30.324986+010020315153Misc activity104.16.166.22880192.168.2.749743TCP
            2025-01-15T02:52:31.441858+010020315153Misc activity104.16.166.22880192.168.2.749768TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:28.551970+010020242911A Network Trojan was detected192.168.2.7577341.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:29.093492+010020242981A Network Trojan was detected192.168.2.749737104.16.166.22880TCP
            2025-01-15T02:52:30.324485+010020242981A Network Trojan was detected192.168.2.749743104.16.166.22880TCP
            2025-01-15T02:52:31.439661+010020242981A Network Trojan was detected192.168.2.749768104.16.166.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:29.093492+010020242991A Network Trojan was detected192.168.2.749737104.16.166.22880TCP
            2025-01-15T02:52:30.324485+010020242991A Network Trojan was detected192.168.2.749743104.16.166.22880TCP
            2025-01-15T02:52:31.439661+010020242991A Network Trojan was detected192.168.2.749768104.16.166.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:29.093492+010020243011A Network Trojan was detected192.168.2.749737104.16.166.22880TCP
            2025-01-15T02:52:30.324485+010020243011A Network Trojan was detected192.168.2.749743104.16.166.22880TCP
            2025-01-15T02:52:31.439661+010020243011A Network Trojan was detected192.168.2.749768104.16.166.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:29.093492+010020243021A Network Trojan was detected192.168.2.749737104.16.166.22880TCP
            2025-01-15T02:52:30.324485+010020243021A Network Trojan was detected192.168.2.749743104.16.166.22880TCP
            2025-01-15T02:52:31.439661+010020243021A Network Trojan was detected192.168.2.749768104.16.166.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T02:52:29.093492+010028033043Unknown Traffic192.168.2.749737104.16.166.22880TCP
            2025-01-15T02:52:30.324485+010028033043Unknown Traffic192.168.2.749743104.16.166.22880TCP
            2025-01-15T02:52:31.439661+010028033043Unknown Traffic192.168.2.749768104.16.166.22880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 9kNjKSEUym.dllAvira: detected
            Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 97%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
            Source: 9kNjKSEUym.dllVirustotal: Detection: 91%Perma Link
            Source: 9kNjKSEUym.dllReversingLabs: Detection: 94%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: 9kNjKSEUym.dllJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: 9kNjKSEUym.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49737 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49737 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49737 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49743 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49743 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49743 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49743 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49768 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49768 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49768 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49768 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49737 -> 104.16.166.228:80
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223a0558d0c354-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:30 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223a0d09ad4391-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:31 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223a140fc6c34f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: unknownNetwork traffic detected: IP country count 11
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.7:57734 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49737 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49743 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49768 -> 104.16.166.228:80
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.7:49743
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.7:49768
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.7:49737
            Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
            Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
            Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
            Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.107
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.107
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.107
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.107
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 81.87.29.1
            Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.201
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.201
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.201
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.201
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 80.92.122.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.192
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 203.152.165.1
            Source: unknownTCP traffic detected without corresponding DNS query: 60.165.77.15
            Source: unknownTCP traffic detected without corresponding DNS query: 60.165.77.15
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: time.windows.com
            Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: 9kNjKSEUym.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: mssecsvc.exe, 00000006.00000002.1406139577.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1406139577.0000000000D1E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2039974595.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1417685726.0000000000A88000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1417685726.0000000000ABE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
            Source: mssecsvc.exe, 0000000B.00000002.1417685726.0000000000ABE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
            Source: mssecsvc.exe, 00000008.00000002.2039471147.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
            Source: mssecsvc.exe, 0000000B.00000002.1417685726.0000000000AE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
            Source: Yara matchFile source: 9kNjKSEUym.dll, type: SAMPLE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23db8e8.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23df948.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1380175550.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.1408232949.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2040324220.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.1392076596.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1417252016.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1417438274.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1380300154.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.1392327724.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.1408392348.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7536, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7692, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

            System Summary

            barindex
            Source: 9kNjKSEUym.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9kNjKSEUym.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1eae084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23d08c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.23db8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23db8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.23df948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23df948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000C.00000002.1416734616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.2040324220.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000B.00000002.1417438274.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000000.1380300154.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000000.1404887094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000C.00000000.1416168646.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000000.1392327724.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000B.00000000.1408392348.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
            Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
            Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
            Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
            Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
            Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
            Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
            Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
            Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
            Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: 9kNjKSEUym.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: 9kNjKSEUym.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9kNjKSEUym.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1eae084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23d08c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.240296c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.240296c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.23df948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23d08c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.23db8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23db8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.23df948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23df948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000C.00000002.1416734616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.2040324220.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000B.00000002.1417438274.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000000.1380300154.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000000.1404887094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000C.00000000.1416168646.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000000.1392327724.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000B.00000000.1408392348.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: tasksche.exe, 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.1416734616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, 9kNjKSEUym.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@2/100
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
            Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
            Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7312:120:WilError_03
            Source: 9kNjKSEUym.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\9kNjKSEUym.dll,PlayGame
            Source: 9kNjKSEUym.dllVirustotal: Detection: 91%
            Source: 9kNjKSEUym.dllReversingLabs: Detection: 94%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\9kNjKSEUym.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",PlayGame
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\9kNjKSEUym.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: 9kNjKSEUym.dllStatic file information: File size 5267459 > 1048576
            Source: 9kNjKSEUym.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
            Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7612Thread sleep count: 90 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7612Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7616Thread sleep count: 131 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7616Thread sleep count: 39 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7612Thread sleep time: -86400000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: mssecsvc.exe, 00000006.00000002.1406139577.0000000000D7C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1406139577.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2039974595.0000000000D08000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2039974595.0000000000D46000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1417685726.0000000000ADB000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1417685726.0000000000A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1Jump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Service Execution
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            OS Credential Dumping1
            Network Share Discovery
            Remote Services1
            Archive Collected Data
            22
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            21
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS2
            System Information Discovery
            Distributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Rundll32
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591517 Sample: 9kNjKSEUym.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 41 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->41 43 time.windows.com 2->43 45 2 other IPs or domains 2->45 63 Tries to download HTTP data from a sinkholed server 2->63 65 Suricata IDS alerts for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 6 other signatures 2->69 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        17 rundll32.exe 9->17         started        20 cmd.exe 1 9->20         started        22 conhost.exe 9->22         started        47 192.168.2.102 unknown unknown 11->47 49 192.168.2.103 unknown unknown 11->49 51 98 other IPs or domains 11->51 73 Connects to many different private IPs via SMB (likely to spread or exploit) 11->73 75 Connects to many different private IPs (likely to spread or exploit) 11->75 signatures6 process7 signatures8 24 mssecsvc.exe 7 15->24         started        61 Drops executables to the windows directory (C:\Windows) and starts them 17->61 27 mssecsvc.exe 7 17->27         started        30 rundll32.exe 1 20->30         started        process9 file10 37 C:\Windows\tasksche.exe, PE32 24->37 dropped 32 tasksche.exe 24->32         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 71 Drops executables to the windows directory (C:\Windows) and starts them 27->71 35 tasksche.exe 27->35         started        signatures11 process12 signatures13 53 Detected Wannacry Ransomware 32->53 55 Antivirus detection for dropped file 32->55 57 Multi AV Scanner detection for dropped file 32->57 59 Machine Learning detection for dropped file 32->59

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            9kNjKSEUym.dll92%VirustotalBrowse
            9kNjKSEUym.dll95%ReversingLabsWin32.Ransomware.WannaCry
            9kNjKSEUym.dll100%AviraTR/AD.WannaCry.svfgk
            9kNjKSEUym.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
            C:\Windows\tasksche.exe100%Joe Sandbox ML
            C:\WINDOWS\qeriuwjhrf (copy)98%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\tasksche.exe98%ReversingLabsWin32.Ransomware.WannaCry
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://www.kryptoslogic.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            104.16.166.228
            truefalse
              high
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                time.windows.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9kNjKSEUym.dllfalse
                      high
                      https://www.kryptoslogic.commssecsvc.exe, 0000000B.00000002.1417685726.0000000000AE9000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 0000000B.00000002.1417685726.0000000000ABE000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2039471147.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          39.87.158.1
                          unknownChina
                          4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                          94.12.91.1
                          unknownUnited Kingdom
                          5607BSKYB-BROADBAND-ASGBfalse
                          109.186.158.1
                          unknownIsrael
                          1680NV-ASNCELLCOMltdILfalse
                          45.191.147.86
                          unknownunknown
                          269690VILACONECTASOLUCOESEMTECNOLOGIALTDABRfalse
                          60.37.241.2
                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                          60.37.241.1
                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                          219.176.146.172
                          unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                          80.92.122.201
                          unknownAustria
                          34347CITYNET-AT-ASATfalse
                          60.154.229.1
                          unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                          210.79.109.79
                          unknownChina
                          17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                          13.29.240.131
                          unknownUnited States
                          26662XEROX-WVUSfalse
                          173.181.137.1
                          unknownCanada
                          852ASN852CAfalse
                          5.198.148.2
                          unknownAustria
                          44453INTERNEX-ASATfalse
                          133.142.126.1
                          unknownJapan2497IIJInternetInitiativeJapanIncJPfalse
                          5.198.148.1
                          unknownAustria
                          44453INTERNEX-ASATfalse
                          95.206.212.1
                          unknownSweden
                          3301TELIANET-SWEDENTeliaCompanySEfalse
                          166.122.148.154
                          unknownUnited States
                          6360UNIVHAWAIIUSfalse
                          175.223.247.60
                          unknownKorea Republic of
                          4766KIXS-AS-KRKoreaTelecomKRfalse
                          40.55.7.33
                          unknownUnited States
                          4249LILLY-ASUSfalse
                          60.165.77.15
                          unknownChina
                          4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                          59.220.102.235
                          unknownChina
                          2516KDDIKDDICORPORATIONJPfalse
                          112.91.195.6
                          unknownChina
                          17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                          3.62.86.174
                          unknownUnited States
                          8987AMAZONEXPANSIONGBfalse
                          112.91.195.1
                          unknownChina
                          17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                          91.194.184.52
                          unknownRussian Federation
                          8853KORSTON-ASRUfalse
                          IP
                          192.168.2.148
                          192.168.2.149
                          192.168.2.146
                          192.168.2.147
                          192.168.2.140
                          192.168.2.141
                          192.168.2.144
                          192.168.2.145
                          192.168.2.142
                          192.168.2.143
                          192.168.2.159
                          192.168.2.157
                          192.168.2.158
                          192.168.2.151
                          192.168.2.152
                          192.168.2.150
                          192.168.2.155
                          192.168.2.156
                          192.168.2.153
                          192.168.2.154
                          192.168.2.126
                          192.168.2.247
                          192.168.2.127
                          192.168.2.248
                          192.168.2.124
                          192.168.2.245
                          192.168.2.125
                          192.168.2.246
                          192.168.2.128
                          192.168.2.249
                          192.168.2.129
                          192.168.2.240
                          192.168.2.122
                          192.168.2.243
                          192.168.2.123
                          192.168.2.244
                          192.168.2.120
                          192.168.2.241
                          192.168.2.121
                          192.168.2.242
                          192.168.2.97
                          192.168.2.137
                          192.168.2.96
                          192.168.2.138
                          192.168.2.99
                          192.168.2.135
                          192.168.2.98
                          192.168.2.136
                          192.168.2.139
                          192.168.2.250
                          192.168.2.130
                          192.168.2.251
                          192.168.2.91
                          192.168.2.90
                          192.168.2.93
                          192.168.2.133
                          192.168.2.254
                          192.168.2.92
                          192.168.2.134
                          192.168.2.95
                          192.168.2.131
                          192.168.2.252
                          192.168.2.94
                          192.168.2.132
                          192.168.2.253
                          192.168.2.104
                          192.168.2.225
                          192.168.2.105
                          192.168.2.226
                          192.168.2.102
                          192.168.2.223
                          192.168.2.103
                          192.168.2.224
                          192.168.2.108
                          192.168.2.229
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1591517
                          Start date and time:2025-01-15 02:51:17 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 5m 2s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:16
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:9kNjKSEUym.dll
                          renamed because original name is a hash value
                          Original Sample Name:978fcc48a006c05c94e626ccb2ddfe53.dll
                          Detection:MAL
                          Classification:mal100.rans.expl.evad.winDLL@20/2@2/100
                          EGA Information:
                          • Successful, ratio: 66.7%
                          HCA Information:Failed
                          Cookbook Comments:
                          • Found application associated with file extension: .dll
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                          • Excluded IPs from analysis (whitelisted): 20.101.57.9, 199.232.214.172, 13.107.246.45, 20.12.23.50
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, twc.trafficmanager.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target tasksche.exe, PID 7640 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          20:52:29API Interceptor1x Sleep call for process: loaddll32.exe modified
                          20:53:04API Interceptor112x Sleep call for process: mssecsvc.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          s-part-0017.t-0009.t-msedge.nethttps://telegrams-tw.org/Get hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          https://6y.tickarmoz.ru/aY57/Get hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          Eastern Contractors Corporation Contract and submittal document.emlGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          download.exeGet hashmaliciousBabuk, MimikatzBrowse
                          • 13.107.246.45
                          https://emp.eduyield.com/el?aid=962445be-3c17-11ec-9620-0e45aa61dde5&cid=497&dest=https://google.com/amp/avrancecorp.com/wp-web/Griffinwink/64616b6f74616c796e6e406772696666696e77696e6b2e636f6d/$ZGFrb3&pid=564628&rid=68730789Get hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                          • 13.107.246.45
                          19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                          • 13.107.246.45
                          https://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                          • 13.107.246.45
                          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                          • 13.107.246.45
                          www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comv9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                          • 104.16.167.228
                          bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                          • 104.16.167.228
                          hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                          • 104.16.167.228
                          sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                          • 104.16.166.228
                          hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                          • 104.16.167.228
                          87c6RORO31.dllGet hashmaliciousWannacryBrowse
                          • 104.16.166.228
                          Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                          • 104.16.167.228
                          5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                          • 104.16.166.228
                          9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                          • 104.16.166.228
                          k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                          • 104.16.167.228
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          BSKYB-BROADBAND-ASGBruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                          • 90.207.146.203
                          x86.elfGet hashmaliciousUnknownBrowse
                          • 2.218.141.115
                          i486.elfGet hashmaliciousUnknownBrowse
                          • 90.217.19.173
                          meth14.elfGet hashmaliciousMiraiBrowse
                          • 2.216.236.49
                          sh4.elfGet hashmaliciousUnknownBrowse
                          • 176.254.67.238
                          elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                          • 176.26.210.220
                          elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                          • 78.86.224.209
                          elitebotnet.mips.elfGet hashmaliciousMirai, OkiruBrowse
                          • 94.194.149.73
                          res.mpsl.elfGet hashmaliciousUnknownBrowse
                          • 176.254.218.204
                          res.arm5.elfGet hashmaliciousUnknownBrowse
                          • 151.231.35.125
                          CHINA169-BACKBONECHINAUNICOMChina169BackboneCND3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                          • 124.94.33.112
                          sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                          • 39.80.197.203
                          ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                          • 27.219.109.201
                          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                          • 182.119.252.121
                          Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                          • 42.63.214.1
                          9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                          • 27.11.108.236
                          mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                          • 39.74.29.1
                          mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                          • 116.178.208.121
                          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                          • 61.167.78.49
                          meth10.elfGet hashmaliciousMiraiBrowse
                          • 60.16.183.30
                          OCNNTTCommunicationsCorporationJPD3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                          • 60.43.125.1
                          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                          • 180.1.23.128
                          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                          • 153.157.148.172
                          6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                          • 125.172.29.1
                          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                          • 123.224.18.174
                          meth10.elfGet hashmaliciousMiraiBrowse
                          • 157.106.137.200
                          meth3.elfGet hashmaliciousMiraiBrowse
                          • 123.222.206.237
                          meth1.elfGet hashmaliciousMiraiBrowse
                          • 58.92.220.23
                          x86.elfGet hashmaliciousUnknownBrowse
                          • 153.204.125.184
                          meth4.elfGet hashmaliciousMiraiBrowse
                          • 157.69.76.176
                          NV-ASNCELLCOMltdIL3.elfGet hashmaliciousUnknownBrowse
                          • 104.115.80.120
                          res.mips.elfGet hashmaliciousUnknownBrowse
                          • 93.172.23.67
                          6.elfGet hashmaliciousUnknownBrowse
                          • 93.172.136.104
                          6.elfGet hashmaliciousUnknownBrowse
                          • 93.172.60.61
                          miori.mpsl.elfGet hashmaliciousUnknownBrowse
                          • 89.139.64.45
                          miori.arm.elfGet hashmaliciousUnknownBrowse
                          • 62.90.170.51
                          sora.mips.elfGet hashmaliciousMiraiBrowse
                          • 82.166.125.145
                          4.elfGet hashmaliciousUnknownBrowse
                          • 89.138.250.225
                          Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                          • 89.138.35.163
                          fuckunix.spc.elfGet hashmaliciousMiraiBrowse
                          • 46.117.58.107
                          No context
                          No context
                          Process:C:\Windows\mssecsvc.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):3514368
                          Entropy (8bit):2.146554109449683
                          Encrypted:false
                          SSDEEP:12288:nQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+D:nQhfdmMSirYbcMNgef0
                          MD5:075929751841BBC9E4DAF155A1C78630
                          SHA1:8F595F867851C82C07F3D9E64F1F36A4DB3CFA89
                          SHA-256:ABF7F235A4D398FF138C9A40938E1B20BC2461BE70595054634E9F15F44462F1
                          SHA-512:35A7C5515953BDA7536419381152C622472264114E851E1367BDFDAD7D3E05A2AACE5F35B90FE1666D26CAABB0C5C805FC1FD47E316A251F975FDA0DD3058173
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 98%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\mssecsvc.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):3514368
                          Entropy (8bit):2.146554109449683
                          Encrypted:false
                          SSDEEP:12288:nQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+D:nQhfdmMSirYbcMNgef0
                          MD5:075929751841BBC9E4DAF155A1C78630
                          SHA1:8F595F867851C82C07F3D9E64F1F36A4DB3CFA89
                          SHA-256:ABF7F235A4D398FF138C9A40938E1B20BC2461BE70595054634E9F15F44462F1
                          SHA-512:35A7C5515953BDA7536419381152C622472264114E851E1367BDFDAD7D3E05A2AACE5F35B90FE1666D26CAABB0C5C805FC1FD47E316A251F975FDA0DD3058173
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                          • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                          • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 98%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):1.8114649339364248
                          TrID:
                          • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                          • Generic Win/DOS Executable (2004/3) 0.20%
                          • DOS Executable Generic (2002/1) 0.20%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:9kNjKSEUym.dll
                          File size:5'267'459 bytes
                          MD5:978fcc48a006c05c94e626ccb2ddfe53
                          SHA1:ed08574fc15f536656610e6f71c1384b3be5df02
                          SHA256:706d780689c904b92e1797614b91f557b1b261e71dc17076a28f3a87f13c6bf6
                          SHA512:095db7ff59095c0c9c73b2ca2c7058acba9dca94735599d398de53c357931d2519bd6d5488fdb5ab5a588ad5cb48fc114e812586d4e7c19b11583b55adda2a1e
                          SSDEEP:12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+D:SbLgddQhfdmMSirYbcMNgef0
                          TLSH:8C36235A766C91FCC11A623060634936EAB77C6A22BD970F8F948B520D13750BF74F47
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                          Icon Hash:7ae282899bbab082
                          Entrypoint:0x100011e9
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x10000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                          DLL Characteristics:
                          Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                          Instruction
                          push ebp
                          mov ebp, esp
                          push ebx
                          mov ebx, dword ptr [ebp+08h]
                          push esi
                          mov esi, dword ptr [ebp+0Ch]
                          push edi
                          mov edi, dword ptr [ebp+10h]
                          test esi, esi
                          jne 00007FBDB11CCE5Bh
                          cmp dword ptr [10003140h], 00000000h
                          jmp 00007FBDB11CCE78h
                          cmp esi, 01h
                          je 00007FBDB11CCE57h
                          cmp esi, 02h
                          jne 00007FBDB11CCE74h
                          mov eax, dword ptr [10003150h]
                          test eax, eax
                          je 00007FBDB11CCE5Bh
                          push edi
                          push esi
                          push ebx
                          call eax
                          test eax, eax
                          je 00007FBDB11CCE5Eh
                          push edi
                          push esi
                          push ebx
                          call 00007FBDB11CCD6Ah
                          test eax, eax
                          jne 00007FBDB11CCE56h
                          xor eax, eax
                          jmp 00007FBDB11CCEA0h
                          push edi
                          push esi
                          push ebx
                          call 00007FBDB11CCC1Ch
                          cmp esi, 01h
                          mov dword ptr [ebp+0Ch], eax
                          jne 00007FBDB11CCE5Eh
                          test eax, eax
                          jne 00007FBDB11CCE89h
                          push edi
                          push eax
                          push ebx
                          call 00007FBDB11CCD46h
                          test esi, esi
                          je 00007FBDB11CCE57h
                          cmp esi, 03h
                          jne 00007FBDB11CCE78h
                          push edi
                          push esi
                          push ebx
                          call 00007FBDB11CCD35h
                          test eax, eax
                          jne 00007FBDB11CCE55h
                          and dword ptr [ebp+0Ch], eax
                          cmp dword ptr [ebp+0Ch], 00000000h
                          je 00007FBDB11CCE63h
                          mov eax, dword ptr [10003150h]
                          test eax, eax
                          je 00007FBDB11CCE5Ah
                          push edi
                          push esi
                          push ebx
                          call eax
                          mov dword ptr [ebp+0Ch], eax
                          mov eax, dword ptr [ebp+0Ch]
                          pop edi
                          pop esi
                          pop ebx
                          pop ebp
                          retn 000Ch
                          jmp dword ptr [10002028h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          Programming Language:
                          • [ C ] VS98 (6.0) build 8168
                          • [C++] VS98 (6.0) build 8168
                          • [RES] VS98 (6.0) cvtres build 1720
                          • [LNK] VS98 (6.0) imp/exp build 8168
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x40000x5000600x50100017338244348b5207a6efc0dd83f68ba6unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          W0x40600x500000dataEnglishUnited States0.7055644989013672
                          DLLImport
                          KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                          MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                          NameOrdinalAddress
                          PlayGame10x10001114
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2025-01-15T02:52:28.551970+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.7577341.1.1.153UDP
                          2025-01-15T02:52:29.093492+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749737104.16.166.22880TCP
                          2025-01-15T02:52:29.093492+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749737104.16.166.22880TCP
                          2025-01-15T02:52:29.093492+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749737104.16.166.22880TCP
                          2025-01-15T02:52:29.093492+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749737104.16.166.22880TCP
                          2025-01-15T02:52:29.093492+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749737104.16.166.22880TCP
                          2025-01-15T02:52:29.098572+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.749737TCP
                          2025-01-15T02:52:30.324485+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749743104.16.166.22880TCP
                          2025-01-15T02:52:30.324485+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749743104.16.166.22880TCP
                          2025-01-15T02:52:30.324485+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749743104.16.166.22880TCP
                          2025-01-15T02:52:30.324485+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749743104.16.166.22880TCP
                          2025-01-15T02:52:30.324485+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749743104.16.166.22880TCP
                          2025-01-15T02:52:30.324986+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.749743TCP
                          2025-01-15T02:52:31.439661+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749768104.16.166.22880TCP
                          2025-01-15T02:52:31.439661+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749768104.16.166.22880TCP
                          2025-01-15T02:52:31.439661+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749768104.16.166.22880TCP
                          2025-01-15T02:52:31.439661+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749768104.16.166.22880TCP
                          2025-01-15T02:52:31.439661+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749768104.16.166.22880TCP
                          2025-01-15T02:52:31.441858+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.749768TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 02:52:21.973579884 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 02:52:26.755337954 CET49671443192.168.2.7204.79.197.203
                          Jan 15, 2025 02:52:27.926758051 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 02:52:28.565674067 CET4973780192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:28.570564032 CET8049737104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:28.570635080 CET4973780192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:28.571499109 CET4973780192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:28.576276064 CET8049737104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:29.093405962 CET8049737104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:29.093432903 CET8049737104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:29.093492031 CET4973780192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:29.093538046 CET4973780192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:29.093641996 CET4973780192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:29.098572016 CET8049737104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:29.757428885 CET49675443192.168.2.7104.98.116.138
                          Jan 15, 2025 02:52:29.757462978 CET49674443192.168.2.7104.98.116.138
                          Jan 15, 2025 02:52:29.837950945 CET4974380192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:29.842720985 CET8049743104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:29.842828035 CET4974380192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:29.843596935 CET4974380192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:29.848364115 CET8049743104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:29.848606110 CET49672443192.168.2.7104.98.116.138
                          Jan 15, 2025 02:52:30.324419022 CET8049743104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:30.324485064 CET4974380192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:30.324609995 CET4974380192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:30.324985981 CET8049743104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:30.325040102 CET4974380192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:30.329327106 CET8049743104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:30.364908934 CET49749445192.168.2.781.87.29.107
                          Jan 15, 2025 02:52:30.369678974 CET4454974981.87.29.107192.168.2.7
                          Jan 15, 2025 02:52:30.369740963 CET49749445192.168.2.781.87.29.107
                          Jan 15, 2025 02:52:30.369774103 CET49749445192.168.2.781.87.29.107
                          Jan 15, 2025 02:52:30.370187998 CET49750445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.374772072 CET4454974981.87.29.107192.168.2.7
                          Jan 15, 2025 02:52:30.374851942 CET49749445192.168.2.781.87.29.107
                          Jan 15, 2025 02:52:30.374993086 CET4454975081.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:30.375072956 CET49750445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.375744104 CET49750445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.379194975 CET49751445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.380522013 CET4454975081.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:30.380610943 CET49750445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.383961916 CET4454975181.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:30.384028912 CET49751445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.384104967 CET49751445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:30.388828039 CET4454975181.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:30.962146044 CET4976880192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:30.967753887 CET8049768104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:30.968219995 CET4976880192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:30.968219995 CET4976880192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:30.973623037 CET8049768104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:31.439579964 CET8049768104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:31.439661026 CET4976880192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:31.439738989 CET4976880192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:31.441858053 CET8049768104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:31.442122936 CET4976880192.168.2.7104.16.166.228
                          Jan 15, 2025 02:52:31.444483042 CET8049768104.16.166.228192.168.2.7
                          Jan 15, 2025 02:52:32.314528942 CET44349703104.98.116.138192.168.2.7
                          Jan 15, 2025 02:52:32.314615965 CET49703443192.168.2.7104.98.116.138
                          Jan 15, 2025 02:52:32.372288942 CET49790445192.168.2.780.92.122.201
                          Jan 15, 2025 02:52:32.377142906 CET4454979080.92.122.201192.168.2.7
                          Jan 15, 2025 02:52:32.378072977 CET49790445192.168.2.780.92.122.201
                          Jan 15, 2025 02:52:32.381181955 CET49790445192.168.2.780.92.122.201
                          Jan 15, 2025 02:52:32.381181955 CET49791445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.386142969 CET4454979080.92.122.201192.168.2.7
                          Jan 15, 2025 02:52:32.386187077 CET4454979180.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:32.386255026 CET49790445192.168.2.780.92.122.201
                          Jan 15, 2025 02:52:32.386477947 CET49791445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.388701916 CET49791445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.393614054 CET4454979180.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:32.393887997 CET49791445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.395899057 CET49792445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.400733948 CET4454979280.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:32.401880980 CET49792445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.402271986 CET49792445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:32.407094955 CET4454979280.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:34.381619930 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:34.386498928 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:34.386590958 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:34.386626959 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:34.386825085 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:34.391510963 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:34.391577959 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:34.391911983 CET44549826203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:34.391973019 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:34.392009974 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:34.393835068 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:34.692382097 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.301764011 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.395529985 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.426547050 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:35.426739931 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:35.426884890 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:35.426930904 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:35.427103043 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:35.427146912 CET49825445192.168.2.7203.152.165.192
                          Jan 15, 2025 02:52:35.427160978 CET44549826203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:35.427228928 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.427772999 CET44549827203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:35.427793026 CET44549826203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:35.427839994 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.427916050 CET44549826203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:35.427942991 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.427987099 CET49826445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.428812027 CET44549826203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:35.428824902 CET44549827203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:35.428864002 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:35.432565928 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:35.432627916 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:35.432847023 CET44549825203.152.165.192192.168.2.7
                          Jan 15, 2025 02:52:35.432910919 CET44549827203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:36.397639990 CET49858445192.168.2.760.165.77.15
                          Jan 15, 2025 02:52:36.403146029 CET4454985860.165.77.15192.168.2.7
                          Jan 15, 2025 02:52:36.403264046 CET49858445192.168.2.760.165.77.15
                          Jan 15, 2025 02:52:36.403362989 CET49858445192.168.2.760.165.77.15
                          Jan 15, 2025 02:52:36.403709888 CET49859445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.408860922 CET4454985860.165.77.15192.168.2.7
                          Jan 15, 2025 02:52:36.408931971 CET49858445192.168.2.760.165.77.15
                          Jan 15, 2025 02:52:36.409316063 CET4454985960.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:36.409393072 CET49859445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.409466028 CET49859445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.410916090 CET49860445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.415005922 CET4454985960.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:36.415071964 CET49859445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.416305065 CET4454986060.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:36.416378975 CET49860445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.418988943 CET49860445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:36.424532890 CET4454986060.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:38.413048029 CET49891445192.168.2.760.37.241.162
                          Jan 15, 2025 02:52:38.417809963 CET4454989160.37.241.162192.168.2.7
                          Jan 15, 2025 02:52:38.417956114 CET49891445192.168.2.760.37.241.162
                          Jan 15, 2025 02:52:38.418354034 CET49891445192.168.2.760.37.241.162
                          Jan 15, 2025 02:52:38.418407917 CET49892445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.423130035 CET4454989160.37.241.162192.168.2.7
                          Jan 15, 2025 02:52:38.423180103 CET4454989260.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:38.423257113 CET49892445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.423307896 CET49891445192.168.2.760.37.241.162
                          Jan 15, 2025 02:52:38.423340082 CET49892445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.424626112 CET49893445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.428147078 CET4454989260.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:38.428210974 CET49892445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.429455996 CET4454989360.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:38.429522038 CET49893445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.429583073 CET49893445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:38.434297085 CET4454989360.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:39.833091021 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 02:52:40.428551912 CET49932445192.168.2.791.194.184.52
                          Jan 15, 2025 02:52:40.433383942 CET4454993291.194.184.52192.168.2.7
                          Jan 15, 2025 02:52:40.433460951 CET49932445192.168.2.791.194.184.52
                          Jan 15, 2025 02:52:40.433509111 CET49932445192.168.2.791.194.184.52
                          Jan 15, 2025 02:52:40.433679104 CET49933445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.438355923 CET4454993291.194.184.52192.168.2.7
                          Jan 15, 2025 02:52:40.438411951 CET49932445192.168.2.791.194.184.52
                          Jan 15, 2025 02:52:40.438420057 CET4454993391.194.184.1192.168.2.7
                          Jan 15, 2025 02:52:40.438483953 CET49933445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.438577890 CET49933445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.439842939 CET49934445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.443432093 CET4454993391.194.184.1192.168.2.7
                          Jan 15, 2025 02:52:40.443504095 CET49933445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.444679022 CET4454993491.194.184.1192.168.2.7
                          Jan 15, 2025 02:52:40.444749117 CET49934445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.444880009 CET49934445192.168.2.791.194.184.1
                          Jan 15, 2025 02:52:40.449613094 CET4454993491.194.184.1192.168.2.7
                          Jan 15, 2025 02:52:42.442754030 CET49968445192.168.2.75.198.148.67
                          Jan 15, 2025 02:52:42.447638988 CET445499685.198.148.67192.168.2.7
                          Jan 15, 2025 02:52:42.447710991 CET49968445192.168.2.75.198.148.67
                          Jan 15, 2025 02:52:42.447756052 CET49968445192.168.2.75.198.148.67
                          Jan 15, 2025 02:52:42.447870970 CET49969445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.452748060 CET445499685.198.148.67192.168.2.7
                          Jan 15, 2025 02:52:42.452759027 CET445499695.198.148.1192.168.2.7
                          Jan 15, 2025 02:52:42.452835083 CET49968445192.168.2.75.198.148.67
                          Jan 15, 2025 02:52:42.452861071 CET49969445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.452904940 CET49969445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.453133106 CET49970445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.457838058 CET445499695.198.148.1192.168.2.7
                          Jan 15, 2025 02:52:42.457878113 CET49969445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.457916021 CET445499705.198.148.1192.168.2.7
                          Jan 15, 2025 02:52:42.457993984 CET49970445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.458053112 CET49970445192.168.2.75.198.148.1
                          Jan 15, 2025 02:52:42.462798119 CET445499705.198.148.1192.168.2.7
                          Jan 15, 2025 02:52:44.471236944 CET50006445192.168.2.759.220.102.235
                          Jan 15, 2025 02:52:44.476131916 CET4455000659.220.102.235192.168.2.7
                          Jan 15, 2025 02:52:44.476203918 CET50006445192.168.2.759.220.102.235
                          Jan 15, 2025 02:52:44.479160070 CET50006445192.168.2.759.220.102.235
                          Jan 15, 2025 02:52:44.479296923 CET50007445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.484010935 CET4455000659.220.102.235192.168.2.7
                          Jan 15, 2025 02:52:44.484086990 CET50006445192.168.2.759.220.102.235
                          Jan 15, 2025 02:52:44.484127998 CET4455000759.220.102.1192.168.2.7
                          Jan 15, 2025 02:52:44.484209061 CET50007445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.484209061 CET50007445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.484416962 CET50008445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.489186049 CET4455000759.220.102.1192.168.2.7
                          Jan 15, 2025 02:52:44.489209890 CET4455000859.220.102.1192.168.2.7
                          Jan 15, 2025 02:52:44.489289999 CET50008445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.489342928 CET50008445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.489362955 CET50007445192.168.2.759.220.102.1
                          Jan 15, 2025 02:52:44.494148016 CET4455000859.220.102.1192.168.2.7
                          Jan 15, 2025 02:52:46.474606037 CET50041445192.168.2.745.191.147.86
                          Jan 15, 2025 02:52:46.479475021 CET4455004145.191.147.86192.168.2.7
                          Jan 15, 2025 02:52:46.479588985 CET50041445192.168.2.745.191.147.86
                          Jan 15, 2025 02:52:46.479696989 CET50041445192.168.2.745.191.147.86
                          Jan 15, 2025 02:52:46.479918003 CET50042445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.484601021 CET4455004145.191.147.86192.168.2.7
                          Jan 15, 2025 02:52:46.484721899 CET50041445192.168.2.745.191.147.86
                          Jan 15, 2025 02:52:46.484824896 CET4455004245.191.147.1192.168.2.7
                          Jan 15, 2025 02:52:46.484903097 CET50042445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.484946012 CET50042445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.485429049 CET50043445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.489901066 CET4455004245.191.147.1192.168.2.7
                          Jan 15, 2025 02:52:46.489955902 CET50042445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.490212917 CET4455004345.191.147.1192.168.2.7
                          Jan 15, 2025 02:52:46.490319014 CET50043445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.490319014 CET50043445192.168.2.745.191.147.1
                          Jan 15, 2025 02:52:46.495189905 CET4455004345.191.147.1192.168.2.7
                          Jan 15, 2025 02:52:48.489865065 CET50080445192.168.2.7147.40.6.3
                          Jan 15, 2025 02:52:48.494656086 CET44550080147.40.6.3192.168.2.7
                          Jan 15, 2025 02:52:48.494779110 CET50080445192.168.2.7147.40.6.3
                          Jan 15, 2025 02:52:48.494986057 CET50080445192.168.2.7147.40.6.3
                          Jan 15, 2025 02:52:48.494986057 CET50081445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.499890089 CET44550081147.40.6.1192.168.2.7
                          Jan 15, 2025 02:52:48.499906063 CET44550080147.40.6.3192.168.2.7
                          Jan 15, 2025 02:52:48.499988079 CET50080445192.168.2.7147.40.6.3
                          Jan 15, 2025 02:52:48.500087976 CET50081445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.500087976 CET50081445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.500879049 CET50082445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.505037069 CET44550081147.40.6.1192.168.2.7
                          Jan 15, 2025 02:52:48.505108118 CET50081445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.505640030 CET44550082147.40.6.1192.168.2.7
                          Jan 15, 2025 02:52:48.505708933 CET50082445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.505791903 CET50082445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:52:48.510513067 CET44550082147.40.6.1192.168.2.7
                          Jan 15, 2025 02:52:50.505337954 CET50113445192.168.2.7165.154.205.88
                          Jan 15, 2025 02:52:50.511102915 CET44550113165.154.205.88192.168.2.7
                          Jan 15, 2025 02:52:50.511169910 CET50113445192.168.2.7165.154.205.88
                          Jan 15, 2025 02:52:50.511260986 CET50113445192.168.2.7165.154.205.88
                          Jan 15, 2025 02:52:50.511418104 CET50114445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.516912937 CET44550114165.154.205.1192.168.2.7
                          Jan 15, 2025 02:52:50.516980886 CET50114445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.517015934 CET50114445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.517071009 CET44550113165.154.205.88192.168.2.7
                          Jan 15, 2025 02:52:50.517127037 CET50113445192.168.2.7165.154.205.88
                          Jan 15, 2025 02:52:50.517407894 CET50115445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.521925926 CET44550114165.154.205.1192.168.2.7
                          Jan 15, 2025 02:52:50.522031069 CET50114445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.522244930 CET44550115165.154.205.1192.168.2.7
                          Jan 15, 2025 02:52:50.522320032 CET50115445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.522367001 CET50115445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:52:50.527122021 CET44550115165.154.205.1192.168.2.7
                          Jan 15, 2025 02:52:51.796154022 CET4454975181.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:51.796536922 CET49751445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:51.796536922 CET49751445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:51.796536922 CET49751445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:51.801414013 CET4454975181.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:51.801429033 CET4454975181.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:52.521126986 CET50148445192.168.2.7171.234.66.236
                          Jan 15, 2025 02:52:52.525912046 CET44550148171.234.66.236192.168.2.7
                          Jan 15, 2025 02:52:52.525975943 CET50148445192.168.2.7171.234.66.236
                          Jan 15, 2025 02:52:52.525995016 CET50148445192.168.2.7171.234.66.236
                          Jan 15, 2025 02:52:52.526092052 CET50149445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.530909061 CET44550148171.234.66.236192.168.2.7
                          Jan 15, 2025 02:52:52.530922890 CET44550149171.234.66.1192.168.2.7
                          Jan 15, 2025 02:52:52.530960083 CET50148445192.168.2.7171.234.66.236
                          Jan 15, 2025 02:52:52.531008959 CET50149445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.531064987 CET50149445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.531320095 CET50150445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.536006927 CET44550149171.234.66.1192.168.2.7
                          Jan 15, 2025 02:52:52.536073923 CET50149445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.536108017 CET44550150171.234.66.1192.168.2.7
                          Jan 15, 2025 02:52:52.536181927 CET50150445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.536217928 CET50150445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:52:52.540944099 CET44550150171.234.66.1192.168.2.7
                          Jan 15, 2025 02:52:53.782216072 CET4454979280.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:53.782275915 CET49792445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:53.782337904 CET49792445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:53.782411098 CET49792445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:53.787110090 CET4454979280.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:53.787197113 CET4454979280.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:54.536636114 CET50184445192.168.2.73.62.86.174
                          Jan 15, 2025 02:52:54.541444063 CET445501843.62.86.174192.168.2.7
                          Jan 15, 2025 02:52:54.541532040 CET50184445192.168.2.73.62.86.174
                          Jan 15, 2025 02:52:54.541567087 CET50184445192.168.2.73.62.86.174
                          Jan 15, 2025 02:52:54.541731119 CET50185445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.546490908 CET445501853.62.86.1192.168.2.7
                          Jan 15, 2025 02:52:54.546511889 CET445501843.62.86.174192.168.2.7
                          Jan 15, 2025 02:52:54.546550035 CET50185445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.546569109 CET50184445192.168.2.73.62.86.174
                          Jan 15, 2025 02:52:54.546659946 CET50185445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.546854973 CET50186445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.551599979 CET445501853.62.86.1192.168.2.7
                          Jan 15, 2025 02:52:54.551611900 CET445501863.62.86.1192.168.2.7
                          Jan 15, 2025 02:52:54.551651955 CET50185445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.551678896 CET50186445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.551691055 CET50186445192.168.2.73.62.86.1
                          Jan 15, 2025 02:52:54.556566954 CET445501863.62.86.1192.168.2.7
                          Jan 15, 2025 02:52:54.802217007 CET50190445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:54.807193041 CET4455019081.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:54.807341099 CET50190445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:54.807383060 CET50190445192.168.2.781.87.29.1
                          Jan 15, 2025 02:52:54.812294006 CET4455019081.87.29.1192.168.2.7
                          Jan 15, 2025 02:52:56.552557945 CET50205445192.168.2.713.29.240.131
                          Jan 15, 2025 02:52:56.557442904 CET4455020513.29.240.131192.168.2.7
                          Jan 15, 2025 02:52:56.557579994 CET50205445192.168.2.713.29.240.131
                          Jan 15, 2025 02:52:56.557732105 CET50205445192.168.2.713.29.240.131
                          Jan 15, 2025 02:52:56.557733059 CET50206445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.562556028 CET4455020613.29.240.1192.168.2.7
                          Jan 15, 2025 02:52:56.562587976 CET4455020513.29.240.131192.168.2.7
                          Jan 15, 2025 02:52:56.562661886 CET50205445192.168.2.713.29.240.131
                          Jan 15, 2025 02:52:56.562676907 CET50206445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.562743902 CET50206445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.563199043 CET50207445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.567734003 CET4455020613.29.240.1192.168.2.7
                          Jan 15, 2025 02:52:56.567815065 CET50206445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.568017006 CET4455020713.29.240.1192.168.2.7
                          Jan 15, 2025 02:52:56.568070889 CET50207445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.568100929 CET50207445192.168.2.713.29.240.1
                          Jan 15, 2025 02:52:56.572916985 CET4455020713.29.240.1192.168.2.7
                          Jan 15, 2025 02:52:56.787029028 CET50208445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:56.791896105 CET4455020880.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:56.791987896 CET50208445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:56.792052031 CET50208445192.168.2.780.92.122.1
                          Jan 15, 2025 02:52:56.796832085 CET4455020880.92.122.1192.168.2.7
                          Jan 15, 2025 02:52:56.813509941 CET44549827203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:56.813642979 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:56.813769102 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:56.813899994 CET49827445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:56.818556070 CET44549827203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:56.818700075 CET44549827203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:57.779931068 CET4454986060.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:57.780081987 CET49860445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:57.780081987 CET49860445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:57.780177116 CET49860445192.168.2.760.165.77.1
                          Jan 15, 2025 02:52:57.784940004 CET4454986060.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:57.784977913 CET4454986060.165.77.1192.168.2.7
                          Jan 15, 2025 02:52:58.568186998 CET50220445192.168.2.7166.122.148.154
                          Jan 15, 2025 02:52:58.573035002 CET44550220166.122.148.154192.168.2.7
                          Jan 15, 2025 02:52:58.573157072 CET50220445192.168.2.7166.122.148.154
                          Jan 15, 2025 02:52:58.573157072 CET50220445192.168.2.7166.122.148.154
                          Jan 15, 2025 02:52:58.573271990 CET50221445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:52:58.578130007 CET44550221166.122.148.1192.168.2.7
                          Jan 15, 2025 02:52:58.578140974 CET44550220166.122.148.154192.168.2.7
                          Jan 15, 2025 02:52:58.578212023 CET50220445192.168.2.7166.122.148.154
                          Jan 15, 2025 02:52:58.578605890 CET50222445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:52:58.578615904 CET50221445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:52:58.583436012 CET44550222166.122.148.1192.168.2.7
                          Jan 15, 2025 02:52:58.583511114 CET50222445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:52:58.583539963 CET50222445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:52:58.583589077 CET44550221166.122.148.1192.168.2.7
                          Jan 15, 2025 02:52:58.583650112 CET50221445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:52:58.588363886 CET44550222166.122.148.1192.168.2.7
                          Jan 15, 2025 02:52:59.794622898 CET4454989360.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:59.794789076 CET49893445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:59.794789076 CET49893445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:59.794789076 CET49893445192.168.2.760.37.241.1
                          Jan 15, 2025 02:52:59.799674034 CET4454989360.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:59.799684048 CET4454989360.37.241.1192.168.2.7
                          Jan 15, 2025 02:52:59.817879915 CET50230445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:59.822685003 CET44550230203.152.165.1192.168.2.7
                          Jan 15, 2025 02:52:59.822771072 CET50230445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:59.822829008 CET50230445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:52:59.827553988 CET44550230203.152.165.1192.168.2.7
                          Jan 15, 2025 02:53:00.583528042 CET50234445192.168.2.739.87.158.233
                          Jan 15, 2025 02:53:00.588344097 CET4455023439.87.158.233192.168.2.7
                          Jan 15, 2025 02:53:00.588413954 CET50234445192.168.2.739.87.158.233
                          Jan 15, 2025 02:53:00.588430882 CET50234445192.168.2.739.87.158.233
                          Jan 15, 2025 02:53:00.588567972 CET50235445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.593331099 CET4455023539.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:00.593365908 CET4455023439.87.158.233192.168.2.7
                          Jan 15, 2025 02:53:00.593413115 CET50234445192.168.2.739.87.158.233
                          Jan 15, 2025 02:53:00.593478918 CET50235445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.593478918 CET50235445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.593625069 CET50236445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.598381042 CET4455023639.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:00.598418951 CET4455023539.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:00.598438978 CET50236445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.598465919 CET50236445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.598467112 CET50235445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:00.603259087 CET4455023639.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:00.786521912 CET50237445192.168.2.760.165.77.1
                          Jan 15, 2025 02:53:00.791371107 CET4455023760.165.77.1192.168.2.7
                          Jan 15, 2025 02:53:00.791449070 CET50237445192.168.2.760.165.77.1
                          Jan 15, 2025 02:53:00.791488886 CET50237445192.168.2.760.165.77.1
                          Jan 15, 2025 02:53:00.796263933 CET4455023760.165.77.1192.168.2.7
                          Jan 15, 2025 02:53:01.825023890 CET4454993491.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:01.825083971 CET49934445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:01.825123072 CET49934445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:01.825166941 CET49934445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:01.829929113 CET4454993491.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:01.829941988 CET4454993491.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:02.599226952 CET50249445192.168.2.731.88.132.232
                          Jan 15, 2025 02:53:02.604130030 CET4455024931.88.132.232192.168.2.7
                          Jan 15, 2025 02:53:02.604186058 CET50249445192.168.2.731.88.132.232
                          Jan 15, 2025 02:53:02.604259968 CET50249445192.168.2.731.88.132.232
                          Jan 15, 2025 02:53:02.604372978 CET50250445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.609143972 CET4455024931.88.132.232192.168.2.7
                          Jan 15, 2025 02:53:02.609160900 CET4455025031.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:02.609195948 CET50249445192.168.2.731.88.132.232
                          Jan 15, 2025 02:53:02.609230995 CET50250445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.609287977 CET50250445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.609488964 CET50252445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.614123106 CET4455025031.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:02.614166975 CET50250445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.614262104 CET4455025231.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:02.614355087 CET50252445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.614389896 CET50252445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:02.619194984 CET4455025231.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:02.802144051 CET50253445192.168.2.760.37.241.1
                          Jan 15, 2025 02:53:02.806993008 CET4455025360.37.241.1192.168.2.7
                          Jan 15, 2025 02:53:02.807105064 CET50253445192.168.2.760.37.241.1
                          Jan 15, 2025 02:53:02.807178974 CET50253445192.168.2.760.37.241.1
                          Jan 15, 2025 02:53:02.811928988 CET4455025360.37.241.1192.168.2.7
                          Jan 15, 2025 02:53:03.858105898 CET445499705.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:03.860227108 CET49970445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:03.860279083 CET49970445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:03.860279083 CET49970445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:03.865118980 CET445499705.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:03.865130901 CET445499705.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:04.615295887 CET50265445192.168.2.794.12.91.252
                          Jan 15, 2025 02:53:04.620177984 CET4455026594.12.91.252192.168.2.7
                          Jan 15, 2025 02:53:04.620273113 CET50265445192.168.2.794.12.91.252
                          Jan 15, 2025 02:53:04.620313883 CET50265445192.168.2.794.12.91.252
                          Jan 15, 2025 02:53:04.620455980 CET50266445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.625248909 CET4455026694.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:04.625312090 CET50266445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.625328064 CET50266445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.625394106 CET4455026594.12.91.252192.168.2.7
                          Jan 15, 2025 02:53:04.625438929 CET50265445192.168.2.794.12.91.252
                          Jan 15, 2025 02:53:04.625571012 CET50267445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.630420923 CET4455026694.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:04.630434036 CET4455026794.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:04.630475044 CET50266445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.630526066 CET50267445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.630563021 CET50267445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:04.635320902 CET4455026794.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:04.833570004 CET50268445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:04.838401079 CET4455026891.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:04.838476896 CET50268445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:04.838560104 CET50268445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:04.843338966 CET4455026891.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:05.875802994 CET4455000859.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:05.875875950 CET50008445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:05.875910044 CET50008445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:05.875953913 CET50008445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:05.880681992 CET4455000859.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:05.880728960 CET4455000859.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:06.489727974 CET50282445192.168.2.7219.176.146.172
                          Jan 15, 2025 02:53:06.494505882 CET44550282219.176.146.172192.168.2.7
                          Jan 15, 2025 02:53:06.494580984 CET50282445192.168.2.7219.176.146.172
                          Jan 15, 2025 02:53:06.494600058 CET50282445192.168.2.7219.176.146.172
                          Jan 15, 2025 02:53:06.494738102 CET50283445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.499500036 CET44550282219.176.146.172192.168.2.7
                          Jan 15, 2025 02:53:06.499557018 CET44550283219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:06.499562025 CET50282445192.168.2.7219.176.146.172
                          Jan 15, 2025 02:53:06.499700069 CET50283445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.499700069 CET50283445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.499991894 CET50284445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.504764080 CET44550283219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:06.504910946 CET44550284219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:06.504997015 CET50284445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.505012989 CET50284445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.505044937 CET50283445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:06.509877920 CET44550284219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:06.864604950 CET50285445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:06.869416952 CET445502855.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:06.869510889 CET50285445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:06.869560957 CET50285445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:06.874396086 CET445502855.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:07.856585026 CET4455004345.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:07.856650114 CET50043445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:07.856682062 CET50043445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:07.856705904 CET50043445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:07.862091064 CET4455004345.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:07.862101078 CET4455004345.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:08.240098000 CET50296445192.168.2.779.164.187.91
                          Jan 15, 2025 02:53:08.244838953 CET4455029679.164.187.91192.168.2.7
                          Jan 15, 2025 02:53:08.244894981 CET50296445192.168.2.779.164.187.91
                          Jan 15, 2025 02:53:08.244963884 CET50296445192.168.2.779.164.187.91
                          Jan 15, 2025 02:53:08.245090961 CET50297445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.249886036 CET4455029679.164.187.91192.168.2.7
                          Jan 15, 2025 02:53:08.249931097 CET50296445192.168.2.779.164.187.91
                          Jan 15, 2025 02:53:08.249947071 CET4455029779.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:08.250009060 CET50297445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.250026941 CET50297445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.250286102 CET50298445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.254919052 CET4455029779.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:08.254977942 CET50297445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.255068064 CET4455029879.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:08.255121946 CET50298445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.255150080 CET50298445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:08.259947062 CET4455029879.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:08.880516052 CET50300445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:08.886667967 CET4455030059.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:08.886765957 CET50300445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:08.886815071 CET50300445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:08.891659975 CET4455030059.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:09.872256994 CET44550082147.40.6.1192.168.2.7
                          Jan 15, 2025 02:53:09.878034115 CET50082445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:09.878654003 CET50082445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:09.879009008 CET50082445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:09.880644083 CET50301445192.168.2.760.154.229.43
                          Jan 15, 2025 02:53:09.883409023 CET44550082147.40.6.1192.168.2.7
                          Jan 15, 2025 02:53:09.883796930 CET44550082147.40.6.1192.168.2.7
                          Jan 15, 2025 02:53:09.885452986 CET4455030160.154.229.43192.168.2.7
                          Jan 15, 2025 02:53:09.885920048 CET50301445192.168.2.760.154.229.43
                          Jan 15, 2025 02:53:09.885987043 CET50301445192.168.2.760.154.229.43
                          Jan 15, 2025 02:53:09.886142015 CET50302445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.890906096 CET4455030160.154.229.43192.168.2.7
                          Jan 15, 2025 02:53:09.891017914 CET4455030260.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:09.891069889 CET50301445192.168.2.760.154.229.43
                          Jan 15, 2025 02:53:09.891103983 CET50302445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.891221046 CET50302445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.891573906 CET50303445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.896040916 CET4455030260.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:09.896348000 CET4455030360.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:09.896414042 CET50302445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.896449089 CET50303445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.896507025 CET50303445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:09.901362896 CET4455030360.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:10.885821104 CET50304445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:10.890702963 CET4455030445.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:10.890880108 CET50304445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:10.891058922 CET50304445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:10.895807981 CET4455030445.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:11.417100906 CET50305445192.168.2.7133.142.126.159
                          Jan 15, 2025 02:53:11.421916008 CET44550305133.142.126.159192.168.2.7
                          Jan 15, 2025 02:53:11.422005892 CET50305445192.168.2.7133.142.126.159
                          Jan 15, 2025 02:53:11.422070026 CET50305445192.168.2.7133.142.126.159
                          Jan 15, 2025 02:53:11.422209978 CET50306445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.426958084 CET44550306133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:11.427016973 CET50306445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.427072048 CET50306445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.427155018 CET44550305133.142.126.159192.168.2.7
                          Jan 15, 2025 02:53:11.427232981 CET50305445192.168.2.7133.142.126.159
                          Jan 15, 2025 02:53:11.427469969 CET50307445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.432156086 CET44550306133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:11.432209969 CET50306445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.432276011 CET44550307133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:11.432348013 CET50307445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.432745934 CET50307445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:11.437536001 CET44550307133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:11.905112982 CET44550115165.154.205.1192.168.2.7
                          Jan 15, 2025 02:53:11.905283928 CET50115445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:11.905394077 CET50115445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:11.905459881 CET50115445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:11.911254883 CET44550115165.154.205.1192.168.2.7
                          Jan 15, 2025 02:53:11.911267996 CET44550115165.154.205.1192.168.2.7
                          Jan 15, 2025 02:53:12.833899021 CET50308445192.168.2.7175.223.247.60
                          Jan 15, 2025 02:53:12.838680029 CET44550308175.223.247.60192.168.2.7
                          Jan 15, 2025 02:53:12.839992046 CET50308445192.168.2.7175.223.247.60
                          Jan 15, 2025 02:53:12.840142965 CET50308445192.168.2.7175.223.247.60
                          Jan 15, 2025 02:53:12.840369940 CET50309445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.844940901 CET44550308175.223.247.60192.168.2.7
                          Jan 15, 2025 02:53:12.845207930 CET44550309175.223.247.1192.168.2.7
                          Jan 15, 2025 02:53:12.845294952 CET50308445192.168.2.7175.223.247.60
                          Jan 15, 2025 02:53:12.845345020 CET50309445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.845427036 CET50309445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.845818043 CET50310445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.850274086 CET44550309175.223.247.1192.168.2.7
                          Jan 15, 2025 02:53:12.850625992 CET44550310175.223.247.1192.168.2.7
                          Jan 15, 2025 02:53:12.850697994 CET50309445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.850753069 CET50310445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.850780010 CET50310445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:12.855581999 CET44550310175.223.247.1192.168.2.7
                          Jan 15, 2025 02:53:12.880337000 CET50311445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:12.885137081 CET44550311147.40.6.1192.168.2.7
                          Jan 15, 2025 02:53:12.885263920 CET50311445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:12.885322094 CET50311445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:12.890045881 CET44550311147.40.6.1192.168.2.7
                          Jan 15, 2025 02:53:13.902848959 CET44550150171.234.66.1192.168.2.7
                          Jan 15, 2025 02:53:13.902925014 CET50150445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:13.902957916 CET50150445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:13.903017998 CET50150445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:13.907687902 CET44550150171.234.66.1192.168.2.7
                          Jan 15, 2025 02:53:13.907788038 CET44550150171.234.66.1192.168.2.7
                          Jan 15, 2025 02:53:14.190372944 CET50312445192.168.2.785.203.227.229
                          Jan 15, 2025 02:53:14.195252895 CET4455031285.203.227.229192.168.2.7
                          Jan 15, 2025 02:53:14.195327044 CET50312445192.168.2.785.203.227.229
                          Jan 15, 2025 02:53:14.195535898 CET50312445192.168.2.785.203.227.229
                          Jan 15, 2025 02:53:14.195693970 CET50313445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.200356007 CET4455031285.203.227.229192.168.2.7
                          Jan 15, 2025 02:53:14.200413942 CET50312445192.168.2.785.203.227.229
                          Jan 15, 2025 02:53:14.200488091 CET4455031385.203.227.1192.168.2.7
                          Jan 15, 2025 02:53:14.200606108 CET50313445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.200706005 CET50313445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.205516100 CET4455031385.203.227.1192.168.2.7
                          Jan 15, 2025 02:53:14.206075907 CET50313445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.217890978 CET50314445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.224993944 CET4455031485.203.227.1192.168.2.7
                          Jan 15, 2025 02:53:14.225116014 CET50314445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.225116968 CET50314445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:14.229937077 CET4455031485.203.227.1192.168.2.7
                          Jan 15, 2025 02:53:14.911837101 CET50315445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:14.916654110 CET44550315165.154.205.1192.168.2.7
                          Jan 15, 2025 02:53:14.916744947 CET50315445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:14.916779041 CET50315445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:14.921530008 CET44550315165.154.205.1192.168.2.7
                          Jan 15, 2025 02:53:15.427654982 CET50316445192.168.2.7112.91.195.6
                          Jan 15, 2025 02:53:15.432449102 CET44550316112.91.195.6192.168.2.7
                          Jan 15, 2025 02:53:15.432518959 CET50316445192.168.2.7112.91.195.6
                          Jan 15, 2025 02:53:15.432540894 CET50316445192.168.2.7112.91.195.6
                          Jan 15, 2025 02:53:15.432646036 CET50317445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.437428951 CET44550316112.91.195.6192.168.2.7
                          Jan 15, 2025 02:53:15.437482119 CET44550317112.91.195.1192.168.2.7
                          Jan 15, 2025 02:53:15.437491894 CET50316445192.168.2.7112.91.195.6
                          Jan 15, 2025 02:53:15.437542915 CET50317445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.437570095 CET50317445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.438348055 CET50318445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.442404985 CET44550317112.91.195.1192.168.2.7
                          Jan 15, 2025 02:53:15.442467928 CET50317445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.443120003 CET44550318112.91.195.1192.168.2.7
                          Jan 15, 2025 02:53:15.443218946 CET50318445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.443218946 CET50318445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:15.448074102 CET44550318112.91.195.1192.168.2.7
                          Jan 15, 2025 02:53:15.950336933 CET445501863.62.86.1192.168.2.7
                          Jan 15, 2025 02:53:15.950397015 CET50186445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:15.950433016 CET50186445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:15.950484991 CET50186445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:15.955343008 CET445501863.62.86.1192.168.2.7
                          Jan 15, 2025 02:53:15.955368042 CET445501863.62.86.1192.168.2.7
                          Jan 15, 2025 02:53:16.217787027 CET4455019081.87.29.1192.168.2.7
                          Jan 15, 2025 02:53:16.217895031 CET50190445192.168.2.781.87.29.1
                          Jan 15, 2025 02:53:16.217940092 CET50190445192.168.2.781.87.29.1
                          Jan 15, 2025 02:53:16.217977047 CET50190445192.168.2.781.87.29.1
                          Jan 15, 2025 02:53:16.222763062 CET4455019081.87.29.1192.168.2.7
                          Jan 15, 2025 02:53:16.222771883 CET4455019081.87.29.1192.168.2.7
                          Jan 15, 2025 02:53:16.271013021 CET50319445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.275919914 CET4455031981.87.29.2192.168.2.7
                          Jan 15, 2025 02:53:16.276000977 CET50319445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.276066065 CET50319445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.276341915 CET50320445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.281002998 CET4455031981.87.29.2192.168.2.7
                          Jan 15, 2025 02:53:16.281071901 CET50319445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.281130075 CET4455032081.87.29.2192.168.2.7
                          Jan 15, 2025 02:53:16.281186104 CET50320445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.281204939 CET50320445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:16.285974026 CET4455032081.87.29.2192.168.2.7
                          Jan 15, 2025 02:53:16.584018946 CET50321445192.168.2.729.218.239.81
                          Jan 15, 2025 02:53:16.588767052 CET4455032129.218.239.81192.168.2.7
                          Jan 15, 2025 02:53:16.588836908 CET50321445192.168.2.729.218.239.81
                          Jan 15, 2025 02:53:16.622991085 CET50321445192.168.2.729.218.239.81
                          Jan 15, 2025 02:53:16.623260975 CET50322445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.627860069 CET4455032129.218.239.81192.168.2.7
                          Jan 15, 2025 02:53:16.627926111 CET50321445192.168.2.729.218.239.81
                          Jan 15, 2025 02:53:16.628074884 CET4455032229.218.239.1192.168.2.7
                          Jan 15, 2025 02:53:16.628132105 CET50322445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.639081001 CET50322445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.643925905 CET4455032229.218.239.1192.168.2.7
                          Jan 15, 2025 02:53:16.643990993 CET50322445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.668179035 CET50323445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.672967911 CET4455032329.218.239.1192.168.2.7
                          Jan 15, 2025 02:53:16.673068047 CET50323445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.673100948 CET50323445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:16.677942038 CET4455032329.218.239.1192.168.2.7
                          Jan 15, 2025 02:53:16.916707993 CET50324445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:16.921642065 CET44550324171.234.66.1192.168.2.7
                          Jan 15, 2025 02:53:16.921727896 CET50324445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:16.931992054 CET50324445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:16.936847925 CET44550324171.234.66.1192.168.2.7
                          Jan 15, 2025 02:53:17.661669970 CET50325445192.168.2.740.55.7.33
                          Jan 15, 2025 02:53:17.666558027 CET4455032540.55.7.33192.168.2.7
                          Jan 15, 2025 02:53:17.666636944 CET50325445192.168.2.740.55.7.33
                          Jan 15, 2025 02:53:17.666703939 CET50325445192.168.2.740.55.7.33
                          Jan 15, 2025 02:53:17.666832924 CET50326445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.671636105 CET4455032540.55.7.33192.168.2.7
                          Jan 15, 2025 02:53:17.671693087 CET4455032640.55.7.1192.168.2.7
                          Jan 15, 2025 02:53:17.671715021 CET50325445192.168.2.740.55.7.33
                          Jan 15, 2025 02:53:17.671747923 CET50326445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.671817064 CET50326445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.672064066 CET50327445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.676657915 CET4455032640.55.7.1192.168.2.7
                          Jan 15, 2025 02:53:17.676702976 CET50326445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.676865101 CET4455032740.55.7.1192.168.2.7
                          Jan 15, 2025 02:53:17.676918983 CET50327445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.676975965 CET50327445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:17.681802034 CET4455032740.55.7.1192.168.2.7
                          Jan 15, 2025 02:53:17.938720942 CET4455020713.29.240.1192.168.2.7
                          Jan 15, 2025 02:53:17.938807964 CET50207445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:17.938852072 CET50207445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:17.938889980 CET50207445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:17.943695068 CET4455020713.29.240.1192.168.2.7
                          Jan 15, 2025 02:53:17.943716049 CET4455020713.29.240.1192.168.2.7
                          Jan 15, 2025 02:53:18.155400991 CET4455020880.92.122.1192.168.2.7
                          Jan 15, 2025 02:53:18.156122923 CET50208445192.168.2.780.92.122.1
                          Jan 15, 2025 02:53:18.156173944 CET50208445192.168.2.780.92.122.1
                          Jan 15, 2025 02:53:18.156234026 CET50208445192.168.2.780.92.122.1
                          Jan 15, 2025 02:53:18.160904884 CET4455020880.92.122.1192.168.2.7
                          Jan 15, 2025 02:53:18.161009073 CET4455020880.92.122.1192.168.2.7
                          Jan 15, 2025 02:53:18.208405972 CET50328445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.213243961 CET4455032880.92.122.2192.168.2.7
                          Jan 15, 2025 02:53:18.216130018 CET50328445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.216196060 CET50328445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.216623068 CET50329445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.221195936 CET4455032880.92.122.2192.168.2.7
                          Jan 15, 2025 02:53:18.221287012 CET50328445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.221508026 CET4455032980.92.122.2192.168.2.7
                          Jan 15, 2025 02:53:18.221681118 CET50329445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.221681118 CET50329445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:18.226591110 CET4455032980.92.122.2192.168.2.7
                          Jan 15, 2025 02:53:18.677649021 CET50331445192.168.2.7210.79.109.79
                          Jan 15, 2025 02:53:18.682595015 CET44550331210.79.109.79192.168.2.7
                          Jan 15, 2025 02:53:18.684305906 CET50331445192.168.2.7210.79.109.79
                          Jan 15, 2025 02:53:18.684350014 CET50331445192.168.2.7210.79.109.79
                          Jan 15, 2025 02:53:18.684464931 CET50332445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.689435005 CET44550331210.79.109.79192.168.2.7
                          Jan 15, 2025 02:53:18.689466000 CET44550332210.79.109.1192.168.2.7
                          Jan 15, 2025 02:53:18.689527035 CET50331445192.168.2.7210.79.109.79
                          Jan 15, 2025 02:53:18.689538956 CET50332445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.689625978 CET50332445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.689872026 CET50333445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.694617987 CET44550332210.79.109.1192.168.2.7
                          Jan 15, 2025 02:53:18.694741011 CET44550333210.79.109.1192.168.2.7
                          Jan 15, 2025 02:53:18.694802046 CET50332445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.694847107 CET50333445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.694847107 CET50333445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:18.699696064 CET44550333210.79.109.1192.168.2.7
                          Jan 15, 2025 02:53:18.958488941 CET50334445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:18.963382006 CET445503343.62.86.1192.168.2.7
                          Jan 15, 2025 02:53:18.963469982 CET50334445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:18.963541031 CET50334445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:18.968411922 CET445503343.62.86.1192.168.2.7
                          Jan 15, 2025 02:53:19.623547077 CET50335445192.168.2.7109.186.158.114
                          Jan 15, 2025 02:53:19.628478050 CET44550335109.186.158.114192.168.2.7
                          Jan 15, 2025 02:53:19.628676891 CET50335445192.168.2.7109.186.158.114
                          Jan 15, 2025 02:53:19.628789902 CET50335445192.168.2.7109.186.158.114
                          Jan 15, 2025 02:53:19.628915071 CET50336445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.633850098 CET44550336109.186.158.1192.168.2.7
                          Jan 15, 2025 02:53:19.633882046 CET44550335109.186.158.114192.168.2.7
                          Jan 15, 2025 02:53:19.633918047 CET50336445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.633938074 CET50335445192.168.2.7109.186.158.114
                          Jan 15, 2025 02:53:19.637007952 CET50336445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.637600899 CET50337445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.641886950 CET44550336109.186.158.1192.168.2.7
                          Jan 15, 2025 02:53:19.641942978 CET50336445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.642478943 CET44550337109.186.158.1192.168.2.7
                          Jan 15, 2025 02:53:19.642560959 CET50337445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.645677090 CET50337445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:19.650520086 CET44550337109.186.158.1192.168.2.7
                          Jan 15, 2025 02:53:19.966057062 CET44550222166.122.148.1192.168.2.7
                          Jan 15, 2025 02:53:19.966607094 CET50222445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:19.966675997 CET50222445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:19.966730118 CET50222445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:19.971513987 CET44550222166.122.148.1192.168.2.7
                          Jan 15, 2025 02:53:19.971545935 CET44550222166.122.148.1192.168.2.7
                          Jan 15, 2025 02:53:20.505471945 CET50338445192.168.2.7173.181.137.115
                          Jan 15, 2025 02:53:20.510412931 CET44550338173.181.137.115192.168.2.7
                          Jan 15, 2025 02:53:20.513937950 CET50338445192.168.2.7173.181.137.115
                          Jan 15, 2025 02:53:20.514059067 CET50338445192.168.2.7173.181.137.115
                          Jan 15, 2025 02:53:20.514414072 CET50339445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.519045115 CET44550338173.181.137.115192.168.2.7
                          Jan 15, 2025 02:53:20.519229889 CET44550339173.181.137.1192.168.2.7
                          Jan 15, 2025 02:53:20.519280910 CET50338445192.168.2.7173.181.137.115
                          Jan 15, 2025 02:53:20.519303083 CET50339445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.519350052 CET50339445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.519661903 CET50340445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.524334908 CET44550339173.181.137.1192.168.2.7
                          Jan 15, 2025 02:53:20.524348021 CET44550339173.181.137.1192.168.2.7
                          Jan 15, 2025 02:53:20.524390936 CET50339445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.524569035 CET44550340173.181.137.1192.168.2.7
                          Jan 15, 2025 02:53:20.525943995 CET50340445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.525986910 CET50340445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:20.531037092 CET44550340173.181.137.1192.168.2.7
                          Jan 15, 2025 02:53:20.942840099 CET50341445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:20.947772980 CET4455034113.29.240.1192.168.2.7
                          Jan 15, 2025 02:53:20.948275089 CET50341445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:20.948306084 CET50341445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:20.953203917 CET4455034113.29.240.1192.168.2.7
                          Jan 15, 2025 02:53:21.186024904 CET44550230203.152.165.1192.168.2.7
                          Jan 15, 2025 02:53:21.186224937 CET50230445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:53:21.186275959 CET50230445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:53:21.186367035 CET50230445192.168.2.7203.152.165.1
                          Jan 15, 2025 02:53:21.191032887 CET44550230203.152.165.1192.168.2.7
                          Jan 15, 2025 02:53:21.191260099 CET44550230203.152.165.1192.168.2.7
                          Jan 15, 2025 02:53:21.240143061 CET50342445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.244992971 CET44550342203.152.165.2192.168.2.7
                          Jan 15, 2025 02:53:21.245083094 CET50342445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.245167017 CET50342445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.245508909 CET50343445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.254375935 CET44550342203.152.165.2192.168.2.7
                          Jan 15, 2025 02:53:21.254446030 CET50342445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.254478931 CET44550343203.152.165.2192.168.2.7
                          Jan 15, 2025 02:53:21.254539967 CET50343445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.254556894 CET50343445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:21.259562969 CET44550343203.152.165.2192.168.2.7
                          Jan 15, 2025 02:53:21.334511042 CET50344445192.168.2.7107.2.125.151
                          Jan 15, 2025 02:53:21.341208935 CET44550344107.2.125.151192.168.2.7
                          Jan 15, 2025 02:53:21.341315985 CET50344445192.168.2.7107.2.125.151
                          Jan 15, 2025 02:53:21.341398954 CET50344445192.168.2.7107.2.125.151
                          Jan 15, 2025 02:53:21.341615915 CET50345445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.346517086 CET44550344107.2.125.151192.168.2.7
                          Jan 15, 2025 02:53:21.346676111 CET50344445192.168.2.7107.2.125.151
                          Jan 15, 2025 02:53:21.346694946 CET44550345107.2.125.1192.168.2.7
                          Jan 15, 2025 02:53:21.346756935 CET50345445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.346810102 CET50345445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.347168922 CET50346445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.351654053 CET44550345107.2.125.1192.168.2.7
                          Jan 15, 2025 02:53:21.351710081 CET50345445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.351974010 CET44550346107.2.125.1192.168.2.7
                          Jan 15, 2025 02:53:21.352153063 CET50346445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.352217913 CET50346445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:21.357014894 CET44550346107.2.125.1192.168.2.7
                          Jan 15, 2025 02:53:21.966259003 CET4455023639.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:21.966490984 CET50236445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:21.966490984 CET50236445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:21.967942953 CET50236445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:21.971545935 CET4455023639.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:21.972996950 CET4455023639.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:22.099525928 CET50347445192.168.2.795.206.212.144
                          Jan 15, 2025 02:53:22.105684042 CET4455034795.206.212.144192.168.2.7
                          Jan 15, 2025 02:53:22.105907917 CET50347445192.168.2.795.206.212.144
                          Jan 15, 2025 02:53:22.106002092 CET50347445192.168.2.795.206.212.144
                          Jan 15, 2025 02:53:22.106245041 CET50348445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.110892057 CET4455034795.206.212.144192.168.2.7
                          Jan 15, 2025 02:53:22.110951900 CET50347445192.168.2.795.206.212.144
                          Jan 15, 2025 02:53:22.111052036 CET4455034895.206.212.1192.168.2.7
                          Jan 15, 2025 02:53:22.111145973 CET50348445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.111196995 CET50348445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.111598015 CET50349445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.116247892 CET4455034895.206.212.1192.168.2.7
                          Jan 15, 2025 02:53:22.116303921 CET50348445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.116349936 CET4455034995.206.212.1192.168.2.7
                          Jan 15, 2025 02:53:22.116431952 CET50349445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.116496086 CET50349445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:22.121301889 CET4455034995.206.212.1192.168.2.7
                          Jan 15, 2025 02:53:22.138055086 CET4455023760.165.77.1192.168.2.7
                          Jan 15, 2025 02:53:22.138123035 CET50237445192.168.2.760.165.77.1
                          Jan 15, 2025 02:53:22.138189077 CET50237445192.168.2.760.165.77.1
                          Jan 15, 2025 02:53:22.138267994 CET50237445192.168.2.760.165.77.1
                          Jan 15, 2025 02:53:22.142962933 CET4455023760.165.77.1192.168.2.7
                          Jan 15, 2025 02:53:22.143003941 CET4455023760.165.77.1192.168.2.7
                          Jan 15, 2025 02:53:22.193227053 CET50350445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.198149920 CET4455035060.165.77.2192.168.2.7
                          Jan 15, 2025 02:53:22.198256016 CET50350445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.198333025 CET50350445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.198884964 CET50351445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.204345942 CET4455035160.165.77.2192.168.2.7
                          Jan 15, 2025 02:53:22.204374075 CET4455035060.165.77.2192.168.2.7
                          Jan 15, 2025 02:53:22.204421997 CET50351445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.204466105 CET50350445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.204538107 CET50351445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:22.209866047 CET4455035160.165.77.2192.168.2.7
                          Jan 15, 2025 02:53:22.974117994 CET50353445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:22.980612993 CET44550353166.122.148.1192.168.2.7
                          Jan 15, 2025 02:53:22.980706930 CET50353445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:22.980766058 CET50353445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:22.987600088 CET44550353166.122.148.1192.168.2.7
                          Jan 15, 2025 02:53:23.970005035 CET4455025231.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:23.970093966 CET50252445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:23.970191002 CET50252445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:23.970242023 CET50252445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:23.975039005 CET4455025231.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:23.975223064 CET4455025231.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:24.153738022 CET4455025360.37.241.1192.168.2.7
                          Jan 15, 2025 02:53:24.153922081 CET50253445192.168.2.760.37.241.1
                          Jan 15, 2025 02:53:24.154047966 CET50253445192.168.2.760.37.241.1
                          Jan 15, 2025 02:53:24.154119015 CET50253445192.168.2.760.37.241.1
                          Jan 15, 2025 02:53:24.158888102 CET4455025360.37.241.1192.168.2.7
                          Jan 15, 2025 02:53:24.158901930 CET4455025360.37.241.1192.168.2.7
                          Jan 15, 2025 02:53:24.208758116 CET50357445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.214067936 CET4455035760.37.241.2192.168.2.7
                          Jan 15, 2025 02:53:24.214193106 CET50357445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.214236975 CET50357445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.215333939 CET50358445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.219377041 CET4455035760.37.241.2192.168.2.7
                          Jan 15, 2025 02:53:24.219450951 CET50357445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.220451117 CET4455035860.37.241.2192.168.2.7
                          Jan 15, 2025 02:53:24.220571041 CET50358445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.220571041 CET50358445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:24.226113081 CET4455035860.37.241.2192.168.2.7
                          Jan 15, 2025 02:53:24.974108934 CET50361445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:24.979397058 CET4455036139.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:24.979496002 CET50361445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:24.979526043 CET50361445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:24.984442949 CET4455036139.87.158.1192.168.2.7
                          Jan 15, 2025 02:53:26.034339905 CET4455026794.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:26.034645081 CET50267445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:26.034646034 CET50267445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:26.034646034 CET50267445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:26.039629936 CET4455026794.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:26.039678097 CET4455026794.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:26.201431990 CET4455026891.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:26.201666117 CET50268445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:26.201666117 CET50268445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:26.201766014 CET50268445192.168.2.791.194.184.1
                          Jan 15, 2025 02:53:26.206599951 CET4455026891.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:26.206629992 CET4455026891.194.184.1192.168.2.7
                          Jan 15, 2025 02:53:26.255737066 CET50370445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.260657072 CET4455037091.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:26.260756016 CET50370445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.260787964 CET50370445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.261099100 CET50371445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.265706062 CET4455037091.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:26.265774012 CET50370445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.265988111 CET4455037191.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:26.266072035 CET50371445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.266108990 CET50371445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:26.271018028 CET4455037191.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:26.974395037 CET50378445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:26.979234934 CET4455037831.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:26.979321003 CET50378445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:26.979350090 CET50378445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:26.984235048 CET4455037831.88.132.1192.168.2.7
                          Jan 15, 2025 02:53:27.891937017 CET44550284219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:27.892105103 CET50284445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:27.892105103 CET50284445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:27.892105103 CET50284445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:27.897892952 CET44550284219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:27.897926092 CET44550284219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:28.013995886 CET4455037191.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:28.014091015 CET50371445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:28.014091015 CET50371445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:28.014169931 CET50371445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:28.019016027 CET4455037191.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:28.019048929 CET4455037191.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:28.235829115 CET445502855.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:28.236020088 CET50285445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:28.238095999 CET50285445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:28.238185883 CET50285445192.168.2.75.198.148.1
                          Jan 15, 2025 02:53:28.243025064 CET445502855.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:28.243057966 CET445502855.198.148.1192.168.2.7
                          Jan 15, 2025 02:53:28.302356958 CET50392445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.307286978 CET445503925.198.148.2192.168.2.7
                          Jan 15, 2025 02:53:28.307374001 CET50392445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.309957027 CET50392445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.310246944 CET50393445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.314873934 CET445503925.198.148.2192.168.2.7
                          Jan 15, 2025 02:53:28.314939976 CET50392445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.315104008 CET445503935.198.148.2192.168.2.7
                          Jan 15, 2025 02:53:28.315164089 CET50393445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.316605091 CET50393445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:28.321434975 CET445503935.198.148.2192.168.2.7
                          Jan 15, 2025 02:53:29.036547899 CET50403445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:29.041460037 CET4455040394.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:29.041662931 CET50403445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:29.041662931 CET50403445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:29.046489000 CET4455040394.12.91.1192.168.2.7
                          Jan 15, 2025 02:53:29.607065916 CET4455029879.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:29.607151985 CET50298445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:29.607374907 CET50298445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:29.607374907 CET50298445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:29.612221956 CET4455029879.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:29.612251043 CET4455029879.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:30.325679064 CET4455030059.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:30.325757980 CET50300445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:30.325799942 CET50300445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:30.325799942 CET50300445192.168.2.759.220.102.1
                          Jan 15, 2025 02:53:30.330617905 CET4455030059.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:30.330679893 CET4455030059.220.102.1192.168.2.7
                          Jan 15, 2025 02:53:30.380671978 CET50428445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.385634899 CET4455042859.220.102.2192.168.2.7
                          Jan 15, 2025 02:53:30.385731936 CET50428445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.385788918 CET50428445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.386107922 CET50429445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.390672922 CET4455042859.220.102.2192.168.2.7
                          Jan 15, 2025 02:53:30.390754938 CET50428445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.390949965 CET4455042959.220.102.2192.168.2.7
                          Jan 15, 2025 02:53:30.391007900 CET50429445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.391053915 CET50429445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:30.395838976 CET4455042959.220.102.2192.168.2.7
                          Jan 15, 2025 02:53:30.896142960 CET50443445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:30.901079893 CET44550443219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:30.901164055 CET50443445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:30.906883001 CET50443445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:30.911910057 CET44550443219.176.146.1192.168.2.7
                          Jan 15, 2025 02:53:31.023205042 CET50446445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:31.028053045 CET4455044691.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:31.028517962 CET50446445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:31.029582977 CET50446445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:31.034424067 CET4455044691.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:31.247575998 CET4455030360.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:31.247654915 CET50303445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:31.249855995 CET50303445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:31.249855995 CET50303445192.168.2.760.154.229.1
                          Jan 15, 2025 02:53:31.254761934 CET4455030360.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:31.254776955 CET4455030360.154.229.1192.168.2.7
                          Jan 15, 2025 02:53:32.283477068 CET4455030445.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:32.283620119 CET50304445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:32.283659935 CET50304445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:32.283659935 CET50304445192.168.2.745.191.147.1
                          Jan 15, 2025 02:53:32.289175987 CET4455030445.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:32.289185047 CET4455030445.191.147.1192.168.2.7
                          Jan 15, 2025 02:53:32.349349022 CET50489445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.354141951 CET4455048945.191.147.2192.168.2.7
                          Jan 15, 2025 02:53:32.354218006 CET50489445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.354238033 CET50489445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.354569912 CET50490445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.359200001 CET4455048945.191.147.2192.168.2.7
                          Jan 15, 2025 02:53:32.359257936 CET50489445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.359402895 CET4455049045.191.147.2192.168.2.7
                          Jan 15, 2025 02:53:32.359457970 CET50490445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.359481096 CET50490445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:32.364276886 CET4455049045.191.147.2192.168.2.7
                          Jan 15, 2025 02:53:32.614629984 CET50502445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:32.619550943 CET4455050279.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:32.621798992 CET50502445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:32.621850014 CET50502445192.168.2.779.164.187.1
                          Jan 15, 2025 02:53:32.626635075 CET4455050279.164.187.1192.168.2.7
                          Jan 15, 2025 02:53:32.760656118 CET4455044691.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:32.761946917 CET50446445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:32.761975050 CET50446445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:32.762022972 CET50446445192.168.2.791.194.184.2
                          Jan 15, 2025 02:53:32.766771078 CET4455044691.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:32.766782045 CET4455044691.194.184.2192.168.2.7
                          Jan 15, 2025 02:53:32.809988022 CET44550307133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:32.813966990 CET50307445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:32.814039946 CET50307445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:32.814039946 CET50307445192.168.2.7133.142.126.1
                          Jan 15, 2025 02:53:32.817960978 CET50514445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.818871975 CET44550307133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:32.818882942 CET44550307133.142.126.1192.168.2.7
                          Jan 15, 2025 02:53:32.822820902 CET4455051491.194.184.3192.168.2.7
                          Jan 15, 2025 02:53:32.822889090 CET50514445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.822933912 CET50514445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.823215961 CET50515445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.827888966 CET4455051491.194.184.3192.168.2.7
                          Jan 15, 2025 02:53:32.827956915 CET50514445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.827972889 CET4455051591.194.184.3192.168.2.7
                          Jan 15, 2025 02:53:32.828033924 CET50515445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.828186035 CET50515445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:32.832983971 CET4455051591.194.184.3192.168.2.7
                          Jan 15, 2025 02:53:34.231921911 CET44550310175.223.247.1192.168.2.7
                          Jan 15, 2025 02:53:34.231975079 CET50310445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:34.265057087 CET44550311147.40.6.1192.168.2.7
                          Jan 15, 2025 02:53:34.265176058 CET50311445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:34.748255014 CET50320445192.168.2.781.87.29.2
                          Jan 15, 2025 02:53:34.748322010 CET50358445192.168.2.760.37.241.2
                          Jan 15, 2025 02:53:34.748358965 CET50351445192.168.2.760.165.77.2
                          Jan 15, 2025 02:53:34.748387098 CET50329445192.168.2.780.92.122.2
                          Jan 15, 2025 02:53:34.748435020 CET50343445192.168.2.7203.152.165.2
                          Jan 15, 2025 02:53:34.748457909 CET50378445192.168.2.731.88.132.1
                          Jan 15, 2025 02:53:34.748461008 CET50429445192.168.2.759.220.102.2
                          Jan 15, 2025 02:53:34.748478889 CET50490445192.168.2.745.191.147.2
                          Jan 15, 2025 02:53:34.748553038 CET50310445192.168.2.7175.223.247.1
                          Jan 15, 2025 02:53:34.748605967 CET50314445192.168.2.785.203.227.1
                          Jan 15, 2025 02:53:34.748620987 CET50315445192.168.2.7165.154.205.1
                          Jan 15, 2025 02:53:34.748639107 CET50311445192.168.2.7147.40.6.1
                          Jan 15, 2025 02:53:34.748647928 CET50318445192.168.2.7112.91.195.1
                          Jan 15, 2025 02:53:34.748668909 CET50323445192.168.2.729.218.239.1
                          Jan 15, 2025 02:53:34.748687983 CET50324445192.168.2.7171.234.66.1
                          Jan 15, 2025 02:53:34.748708963 CET50327445192.168.2.740.55.7.1
                          Jan 15, 2025 02:53:34.748734951 CET50333445192.168.2.7210.79.109.1
                          Jan 15, 2025 02:53:34.748754978 CET50334445192.168.2.73.62.86.1
                          Jan 15, 2025 02:53:34.748804092 CET50340445192.168.2.7173.181.137.1
                          Jan 15, 2025 02:53:34.748814106 CET50341445192.168.2.713.29.240.1
                          Jan 15, 2025 02:53:34.748838902 CET50337445192.168.2.7109.186.158.1
                          Jan 15, 2025 02:53:34.748840094 CET50346445192.168.2.7107.2.125.1
                          Jan 15, 2025 02:53:34.748863935 CET50349445192.168.2.795.206.212.1
                          Jan 15, 2025 02:53:34.748877048 CET50353445192.168.2.7166.122.148.1
                          Jan 15, 2025 02:53:34.748902082 CET50361445192.168.2.739.87.158.1
                          Jan 15, 2025 02:53:34.748940945 CET50403445192.168.2.794.12.91.1
                          Jan 15, 2025 02:53:34.748955011 CET50393445192.168.2.75.198.148.2
                          Jan 15, 2025 02:53:34.749022007 CET50443445192.168.2.7219.176.146.1
                          Jan 15, 2025 02:53:34.749063015 CET50515445192.168.2.791.194.184.3
                          Jan 15, 2025 02:53:34.749161959 CET50502445192.168.2.779.164.187.1
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 02:52:21.052762985 CET5381353192.168.2.71.1.1.1
                          Jan 15, 2025 02:52:28.551970005 CET5773453192.168.2.71.1.1.1
                          Jan 15, 2025 02:52:28.559596062 CET53577341.1.1.1192.168.2.7
                          Jan 15, 2025 02:53:17.035094023 CET138138192.168.2.7192.168.2.255
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 15, 2025 02:52:21.052762985 CET192.168.2.71.1.1.10x4584Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                          Jan 15, 2025 02:52:28.551970005 CET192.168.2.71.1.1.10xf956Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 15, 2025 02:52:21.059722900 CET1.1.1.1192.168.2.70x4584No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                          Jan 15, 2025 02:52:21.947097063 CET1.1.1.1192.168.2.70x5e15No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                          Jan 15, 2025 02:52:21.947097063 CET1.1.1.1192.168.2.70x5e15No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                          Jan 15, 2025 02:52:28.559596062 CET1.1.1.1192.168.2.70xf956No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                          Jan 15, 2025 02:52:28.559596062 CET1.1.1.1192.168.2.70xf956No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                          • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.749737104.16.166.228807440C:\Windows\mssecsvc.exe
                          TimestampBytes transferredDirectionData
                          Jan 15, 2025 02:52:28.571499109 CET100OUTGET / HTTP/1.1
                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                          Cache-Control: no-cache
                          Jan 15, 2025 02:52:29.093405962 CET778INHTTP/1.1 200 OK
                          Date: Wed, 15 Jan 2025 01:52:29 GMT
                          Content-Type: text/html
                          Content-Length: 607
                          Connection: close
                          Server: cloudflare
                          CF-RAY: 90223a0558d0c354-EWR
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.749743104.16.166.228807536C:\Windows\mssecsvc.exe
                          TimestampBytes transferredDirectionData
                          Jan 15, 2025 02:52:29.843596935 CET100OUTGET / HTTP/1.1
                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                          Cache-Control: no-cache
                          Jan 15, 2025 02:52:30.324419022 CET778INHTTP/1.1 200 OK
                          Date: Wed, 15 Jan 2025 01:52:30 GMT
                          Content-Type: text/html
                          Content-Length: 607
                          Connection: close
                          Server: cloudflare
                          CF-RAY: 90223a0d09ad4391-EWR
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.749768104.16.166.228807692C:\Windows\mssecsvc.exe
                          TimestampBytes transferredDirectionData
                          Jan 15, 2025 02:52:30.968219995 CET100OUTGET / HTTP/1.1
                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                          Cache-Control: no-cache
                          Jan 15, 2025 02:52:31.439579964 CET778INHTTP/1.1 200 OK
                          Date: Wed, 15 Jan 2025 01:52:31 GMT
                          Content-Type: text/html
                          Content-Length: 607
                          Connection: close
                          Server: cloudflare
                          CF-RAY: 90223a140fc6c34f-EWR
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:20:52:26
                          Start date:14/01/2025
                          Path:C:\Windows\System32\loaddll32.exe
                          Wow64 process (32bit):true
                          Commandline:loaddll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll"
                          Imagebase:0xb90000
                          File size:126'464 bytes
                          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:1
                          Start time:20:52:26
                          Start date:14/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:20:52:26
                          Start date:14/01/2025
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1
                          Imagebase:0x410000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:20:52:26
                          Start date:14/01/2025
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe C:\Users\user\Desktop\9kNjKSEUym.dll,PlayGame
                          Imagebase:0xf50000
                          File size:61'440 bytes
                          MD5 hash:889B99C52A60DD49227C5E485A016679
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:20:52:26
                          Start date:14/01/2025
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",#1
                          Imagebase:0xf50000
                          File size:61'440 bytes
                          MD5 hash:889B99C52A60DD49227C5E485A016679
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:6
                          Start time:20:52:26
                          Start date:14/01/2025
                          Path:C:\Windows\mssecsvc.exe
                          Wow64 process (32bit):true
                          Commandline:C:\WINDOWS\mssecsvc.exe
                          Imagebase:0x400000
                          File size:3'723'264 bytes
                          MD5 hash:CF96DFB043DDC2C720A67DC71F5B2DA2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1380175550.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1380300154.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1380300154.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                          Reputation:low
                          Has exited:true

                          Target ID:8
                          Start time:20:52:28
                          Start date:14/01/2025
                          Path:C:\Windows\mssecsvc.exe
                          Wow64 process (32bit):true
                          Commandline:C:\WINDOWS\mssecsvc.exe -m security
                          Imagebase:0x400000
                          File size:3'723'264 bytes
                          MD5 hash:CF96DFB043DDC2C720A67DC71F5B2DA2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2040535957.00000000023DF000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2040324220.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2040324220.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1392076596.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1392327724.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1392327724.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                          Reputation:low
                          Has exited:true

                          Target ID:9
                          Start time:20:52:29
                          Start date:14/01/2025
                          Path:C:\Windows\tasksche.exe
                          Wow64 process (32bit):false
                          Commandline:C:\WINDOWS\tasksche.exe /i
                          Imagebase:0x400000
                          File size:3'514'368 bytes
                          MD5 hash:075929751841BBC9E4DAF155A1C78630
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1404887094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                          • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                          • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 98%, ReversingLabs
                          Reputation:low
                          Has exited:true

                          Target ID:10
                          Start time:20:52:29
                          Start date:14/01/2025
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe "C:\Users\user\Desktop\9kNjKSEUym.dll",PlayGame
                          Imagebase:0xf50000
                          File size:61'440 bytes
                          MD5 hash:889B99C52A60DD49227C5E485A016679
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:11
                          Start time:20:52:29
                          Start date:14/01/2025
                          Path:C:\Windows\mssecsvc.exe
                          Wow64 process (32bit):true
                          Commandline:C:\WINDOWS\mssecsvc.exe
                          Imagebase:0x400000
                          File size:3'723'264 bytes
                          MD5 hash:CF96DFB043DDC2C720A67DC71F5B2DA2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1408232949.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1417252016.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1417438274.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1417438274.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1408392348.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1408392348.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                          Reputation:low
                          Has exited:true

                          Target ID:12
                          Start time:20:52:30
                          Start date:14/01/2025
                          Path:C:\Windows\tasksche.exe
                          Wow64 process (32bit):false
                          Commandline:C:\WINDOWS\tasksche.exe /i
                          Imagebase:0x400000
                          File size:3'514'368 bytes
                          MD5 hash:075929751841BBC9E4DAF155A1C78630
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1416734616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1416168646.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:71.8%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:64.9%
                            Total number of Nodes:37
                            Total number of Limit Nodes:9

                            Callgraph

                            Control-flow Graph

                            APIs
                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FDE0EF0,?,00000000), ref: 00407CEF
                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                            • sprintf.MSVCRT ref: 00407E01
                            • sprintf.MSVCRT ref: 00407E18
                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                            • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                            • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                            • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                            • CreateProcessA.KERNELBASE ref: 00407EE8
                            • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                            • CloseHandle.KERNEL32(08000000), ref: 00407F02
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1405586253.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000006.00000002.1405555175.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405608700.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405693293.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                            • API String ID: 4281112323-1507730452
                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000006.00000002.1405586253.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000006.00000002.1405555175.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405608700.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405693293.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                            • String ID:
                            • API String ID: 801014965-0
                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                            Control-flow Graph

                            APIs
                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                            Strings
                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                            Memory Dump Source
                            • Source File: 00000006.00000002.1405586253.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000006.00000002.1405555175.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405608700.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405693293.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                            • API String ID: 774561529-2942426231
                            • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                            • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                            • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                            • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                            Control-flow Graph

                            APIs
                            • sprintf.MSVCRT ref: 00407C56
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FDE0EF0,00000000), ref: 00407C9B
                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1405586253.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000006.00000002.1405555175.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405608700.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405693293.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                            • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                            • API String ID: 3340711343-4063779371
                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                            Control-flow Graph

                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                            • __p___argc.MSVCRT ref: 004080A5
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FDE0EF0,00000000,?,004081B2), ref: 004080DC
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1405586253.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000006.00000002.1405555175.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405608700.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405631006.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405693293.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000006.00000002.1405775572.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                            • String ID: mssecsvc2.0
                            • API String ID: 4274534310-3729025388
                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                            Execution Graph

                            Execution Coverage:34.9%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:0%
                            Total number of Nodes:35
                            Total number of Limit Nodes:2

                            Callgraph

                            Control-flow Graph

                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                            • __p___argc.MSVCRT ref: 004080A5
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FDE0EF0,00000000,?,004081B2), ref: 004080DC
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.2039519201.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000008.00000002.2039504198.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039536162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039611815.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039628811.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                            • String ID: mssecsvc2.0
                            • API String ID: 4274534310-3729025388
                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                            Control-flow Graph

                            APIs
                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                            Strings
                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                            Memory Dump Source
                            • Source File: 00000008.00000002.2039519201.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000008.00000002.2039504198.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039536162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039611815.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039628811.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                            • API String ID: 774561529-2942426231
                            • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                            • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                            • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                            • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                            Control-flow Graph

                            APIs
                            • sprintf.MSVCRT ref: 00407C56
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FDE0EF0,00000000), ref: 00407C9B
                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.2039519201.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000008.00000002.2039504198.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039536162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039611815.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039628811.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                            • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                            • API String ID: 3340711343-4063779371
                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                            APIs
                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FDE0EF0,?,00000000), ref: 00407CEF
                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                            • sprintf.MSVCRT ref: 00407E01
                            • sprintf.MSVCRT ref: 00407E18
                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.2039519201.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000008.00000002.2039504198.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039536162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039611815.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039628811.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                            • API String ID: 4072214828-1507730452
                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.2039519201.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000008.00000002.2039504198.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039536162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039552570.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039595108.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039611815.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039628811.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000008.00000002.2039714164.0000000000858000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                            Yara matches
                            Similarity
                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                            • String ID:
                            • API String ID: 801014965-0
                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                            APIs
                            • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: memcpy
                            • String ID: /../$/..\$\../$\..\
                            • API String ID: 3510742995-3885502717
                            • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                            • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                            • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                            • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                            APIs
                            • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                            • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                            • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                            • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                            • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                            • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                            • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$LibraryLoad
                            • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                            • API String ID: 2238633743-2459060434
                            • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                            • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                            • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                            • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                            • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                            • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                            • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandleOpen$ManagerStart
                            • String ID: cmd.exe /c "%s"
                            • API String ID: 1485051382-955883872
                            • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                            • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                            • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                            • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                            APIs
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                            • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                            • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                            • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                            • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                            • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??0exception@@ExceptionThrow$memcpy
                            • String ID:
                            • API String ID: 1881450474-3916222277
                            • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                            • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                            • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                            • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                            APIs
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                            • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                            • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                            • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                            • String ID: WANACRY!
                            • API String ID: 283026544-1240840912
                            • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                            • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                            • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                            • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                            APIs
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                            • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??0exception@@ExceptionThrowmemcpy
                            • String ID: $Q;@
                            • API String ID: 2382887404-262343263
                            • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                            • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                            • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                            • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                            APIs
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                            • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??0exception@@ExceptionThrowmemcpy
                            • String ID:
                            • API String ID: 2382887404-3916222277
                            • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                            • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                            • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                            • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                            APIs
                            • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                            • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                            • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: Heap$FreeProcessfree
                            • String ID:
                            • API String ID: 3428986607-0
                            • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                            • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                            • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                            • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                            APIs
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                            • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??0exception@@ExceptionThrow
                            • String ID:
                            • API String ID: 941485209-0
                            • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                            • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                            • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                            • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                            APIs
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                            • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??0exception@@ExceptionThrow
                            • String ID:
                            • API String ID: 941485209-0
                            • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                            • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                            • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                            • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: memcpy
                            • String ID:
                            • API String ID: 3510742995-0
                            • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                            • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                            • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                            • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                            APIs
                            • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ContextCryptRelease
                            • String ID:
                            • API String ID: 829835001-0
                            • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                            • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                            • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                            • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                            • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                            • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                            • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                            • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                            • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                            • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                            APIs
                              • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                              • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                              • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                              • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                              • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                              • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                              • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                            • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                            • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                            • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                            • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                            • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$LibraryLoad
                            • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                            • API String ID: 2238633743-1294736154
                            • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                            • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                            • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                            • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: %s%s$%s%s%s$:$\
                            • API String ID: 0-1100577047
                            • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                            • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                            • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                            • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                            APIs
                            • __p___argv.MSVCRT(0040F538), ref: 00402040
                            • strcmp.MSVCRT(?), ref: 0040204B
                            • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                            • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                              • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                            • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                            • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                            • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                              • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                              • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                              • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                              • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                            • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                            • API String ID: 1074704982-2844324180
                            • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                            • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                            • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                            • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                            APIs
                            • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                            • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                            • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                            • strlen.MSVCRT(?), ref: 004011A7
                            • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                            • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                            • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                            • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                            • String ID: 0@$Software\$WanaCrypt0r
                            • API String ID: 865909632-3421300005
                            • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                            • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                            • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                            • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                            • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                            • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                            • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                            • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                            • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                            • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                              • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                              • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                              • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                              • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                            • String ID: %s\Intel$%s\ProgramData
                            • API String ID: 3806094219-198707228
                            • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                            • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                            • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                            • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                            APIs
                              • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                            • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                            • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                            • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                              • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                            • SetLastError.KERNEL32(0000045A), ref: 00402430
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                            • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                            • API String ID: 1900561814-3657104962
                            • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                            • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                            • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                            • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                            APIs
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                            • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                            • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: Directory$AttributesCreateCurrentFile$swprintf
                            • String ID: %s\%s
                            • API String ID: 1036847564-4073750446
                            • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                            • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                            • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                            • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                            APIs
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                            • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                            • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                            • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                            • CloseHandle.KERNEL32(?), ref: 004010EC
                            • CloseHandle.KERNEL32(?), ref: 004010F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                            • String ID: D
                            • API String ID: 786732093-2746444292
                            • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                            • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                            • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                            • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                            APIs
                            • __set_app_type.MSVCRT(00000002), ref: 004077E7
                            • __p__fmode.MSVCRT ref: 004077FC
                            • __p__commode.MSVCRT ref: 0040780A
                            • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                            • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                            • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                            • String ID:
                            • API String ID: 3626615345-0
                            • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                            • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                            • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                            • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                            APIs
                            • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                              • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                            • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                            • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                            • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                            • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                            • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                            • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                            • String ID:
                            • API String ID: 2141228402-0
                            • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                            • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                            • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                            • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                            APIs
                            • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                            • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                            • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: Read$realloc
                            • String ID: ?!@
                            • API String ID: 1241503663-708128716
                            • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                            • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                            • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                            • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                            APIs
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: rand$wcslen$ComputerNamesrand
                            • String ID:
                            • API String ID: 3058258771-0
                            • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                            • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                            • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                            • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                            APIs
                            • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                            • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                            • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                            • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                            • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                            • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                            • String ID:
                            • API String ID: 2935503933-0
                            • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                            • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                            • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                            • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                            APIs
                            • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                            • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                            • Sleep.KERNEL32(000003E8), ref: 00401F40
                            • CloseHandle.KERNEL32(00000000), ref: 00401F52
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandleMutexOpenSleepsprintf
                            • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                            • API String ID: 2780352083-2959021817
                            • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                            • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                            • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                            • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                            APIs
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                            • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                            • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                            • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??0exception@@ExceptionThrowmemcpy
                            • String ID:
                            • API String ID: 2382887404-0
                            • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                            • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                            • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                            • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                            APIs
                            • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                            • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                            • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                            • fclose.MSVCRT(00000000), ref: 00401058
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: fclosefopenfreadfwrite
                            • String ID: c.wnry
                            • API String ID: 4000964834-3240288721
                            • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                            • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                            • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                            • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                            APIs
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                            • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                            • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                            • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                            • String ID:
                            • API String ID: 2811923685-0
                            • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                            • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                            • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                            • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                            APIs
                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                            • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Pointer$??2@Create
                            • String ID:
                            • API String ID: 1331958074-0
                            • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                            • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                            • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                            • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                            APIs
                            • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                            • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast_stricmp
                            • String ID: P!@
                            • API String ID: 1278613211-1774101457
                            • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                            • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                            • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                            • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                            APIs
                            • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                            • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: AttributesFilestrcmp
                            • String ID: c.wnry
                            • API String ID: 3324900478-3240288721
                            • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                            • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                            • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                            • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                            APIs
                            • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                            • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: ??3@CloseHandle
                            • String ID: $l@
                            • API String ID: 3816424416-2140230165
                            • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                            • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                            • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                            • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                            APIs
                            • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                            • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                            • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                            • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                            Memory Dump Source
                            • Source File: 00000009.00000002.1405234625.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1405204333.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405256993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405277055.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000009.00000002.1405299768.0000000000548000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalSection$Leave$Entermemcpy
                            • String ID:
                            • API String ID: 3435569088-0
                            • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                            • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                            • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                            • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65