Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tTbeoLWNhb.dll

Overview

General Information

Sample name:tTbeoLWNhb.dll
renamed because original name is a hash value
Original sample name:4c58581fa08accc15994f3db1098a5bc.dll
Analysis ID:1591518
MD5:4c58581fa08accc15994f3db1098a5bc
SHA1:1a349b33c6cc821b814138eb9619fcbce20e6eda
SHA256:7ab78920ad07396864187254f5323571807df03ca90c6b5eab2d1c8d0c27b4d5
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6844 cmdline: loaddll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2832 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4528 cmdline: rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 792 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 9BCD08D46432B6DAC27417B0DE3DA8B1)
          • tasksche.exe (PID: 6168 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 82246A37BC2B94A29240A8B49DE5CF57)
    • rundll32.exe (PID: 4320 cmdline: rundll32.exe C:\Users\user\Desktop\tTbeoLWNhb.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2100 cmdline: rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 3904 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 9BCD08D46432B6DAC27417B0DE3DA8B1)
        • tasksche.exe (PID: 6720 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 82246A37BC2B94A29240A8B49DE5CF57)
  • mssecsvc.exe (PID: 2160 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 9BCD08D46432B6DAC27417B0DE3DA8B1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
tTbeoLWNhb.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    tTbeoLWNhb.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    tTbeoLWNhb.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0000000A.00000000.1537482998.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        0000000C.00000002.1548367393.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000006.00000000.1510211339.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000C.00000000.1547215244.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            8.2.mssecsvc.exe.1d6b084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              6.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              6.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              6.2.mssecsvc.exe.7100a4.1.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
              • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
              • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:29.281978+010020315153Misc activity104.16.167.22880192.168.2.849706TCP
              2025-01-15T02:52:30.686912+010020315153Misc activity104.16.167.22880192.168.2.849707TCP
              2025-01-15T02:52:31.686298+010020315153Misc activity104.16.167.22880192.168.2.849719TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:28.759322+010020242911A Network Trojan was detected192.168.2.8572461.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:29.281342+010020242981A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-15T02:52:30.686897+010020242981A Network Trojan was detected192.168.2.849707104.16.167.22880TCP
              2025-01-15T02:52:31.685914+010020242981A Network Trojan was detected192.168.2.849719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:29.281342+010020242991A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-15T02:52:30.686897+010020242991A Network Trojan was detected192.168.2.849707104.16.167.22880TCP
              2025-01-15T02:52:31.685914+010020242991A Network Trojan was detected192.168.2.849719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:29.281342+010020243011A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-15T02:52:30.686897+010020243011A Network Trojan was detected192.168.2.849707104.16.167.22880TCP
              2025-01-15T02:52:31.685914+010020243011A Network Trojan was detected192.168.2.849719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:29.281342+010020243021A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-15T02:52:30.686897+010020243021A Network Trojan was detected192.168.2.849707104.16.167.22880TCP
              2025-01-15T02:52:31.685914+010020243021A Network Trojan was detected192.168.2.849719104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:29.281342+010028033043Unknown Traffic192.168.2.849706104.16.167.22880TCP
              2025-01-15T02:52:30.686897+010028033043Unknown Traffic192.168.2.849707104.16.167.22880TCP
              2025-01-15T02:52:31.685914+010028033043Unknown Traffic192.168.2.849719104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: tTbeoLWNhb.dllAvira: detected
              Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
              Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 93%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
              Source: tTbeoLWNhb.dllReversingLabs: Detection: 94%
              Source: tTbeoLWNhb.dllVirustotal: Detection: 93%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: tTbeoLWNhb.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 10_2_004018B9 CryptReleaseContext,10_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: tTbeoLWNhb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: Binary string: ntdll.pdb source: tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.dr
              Source: Binary string: ntdll.pdb3 source: tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.dr

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49707 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49707 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49707 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49707 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223a068edf8c99-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:30 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223a0e4a055e65-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:31 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223a15992bde9b-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: unknownNetwork traffic detected: IP country count 11
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:57246 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49719 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49719
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49706
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49707 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49707
              Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.83
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.83
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.83
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.83
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 28.124.93.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.67
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.67
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.67
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.67
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 152.30.194.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.26
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.26
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.26
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.26
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 101.229.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.98
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.98
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.98
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.1
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.98
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.1
              Source: unknownTCP traffic detected without corresponding DNS query: 121.178.121.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://api.adtimaserver.vn/rdext/json2?count=1&zoneId=870285593013603088
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://api.adtimaserver.vn/renders4?agent=&zones=1894904669163438980
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://b.scorecardresearch.com/b?c1=2&c2=10367196&ns__t=1497259682395&ns_c=UTF-8&cv=3.1&c8=Ng%C6%B0%
              Source: tasksche.exe.6.drString found in binary or memory: http://eva.vn/phim-hay/buc-anh-he-lo-nguoi-dan-ong-cuoi-cung-cua-van-trong-song-chung-voi-me-chong-g
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://log.adtimaserver.vn/trackpv/?aid=c26abb975506e00158a22c6b553a9c90&category=ct%3Dvi%3Bcategory
              Source: tasksche.exe.6.drString found in binary or memory: http://mp3.zing.vn/album/Nhung-Bai-Hat-Hay-Nhat-Cua-Nhu-Quynh-Nhu-Quynh/ZWZBOZOA.htmlAdtima
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://mp3.zing.vn/album/Nhung-Bai-Hat-Hay-Nhat-Cua-Nhu-Quynh-Nhu-Quynh/ZWZBOZOA.htmlCriteo
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://mp3.zing.vn/album/Nhung-Bai-Hat-Hay-Nhat-Cua-Nhu-Quynh-Nhu-Quynh/ZWZBOZOA.htmlScorecardResear
              Source: tasksche.exe.6.drString found in binary or memory: http://quangcao.24h.com.vn/quangcao/2017/03/test17007_bbthanhmai_tremai_9397.html
              Source: tasksche.exe.6.drString found in binary or memory: http://quangcao.eva.vn/quangcao/2017/03/test17007_bbthanhmai_giamgia50_9396.html
              Source: mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://rtax.criteo.com/delivery/rta/rta.js?netId=3254&cookieName=crtg_vng_rta&rnd=74276450073&varNam
              Source: tasksche.exe.6.drString found in binary or memory: http://st-n.ads3-adnow.com/js/ta.js
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://toolbar.conduit.com/Developer/HtmlAndGadget/Methods/JSInjection.aspx
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://tpc.googlesyndication.com/
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://tpc.googlesyndication.com/Dhttp://tpc.googlesyndication.com/safeframe/1-0-9/html/container.ht
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: http://tpc.googlesyndication.com/safeframe/1-0-9/html/container.html
              Source: mssecsvc.exe.3.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000006.00000002.1541734957.0000000000B2E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1551092192.0000000000C7F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1551092192.0000000000C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2
              Source: mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/i
              Source: mssecsvc.exe, 0000000B.00000002.1551092192.0000000000C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ll
              Source: mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s9
              Source: mssecsvc.exe, 00000008.00000002.2173045165.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: tasksche.exe.6.drString found in binary or memory: https://apis.google.com/se/0/_/
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: https://muachung.vn/du-lich/hanh-huong-yen-tu-chua-dong-ba-vang-1-ngay-165493.html?utm_source=admark
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: https://muachung.vn/du-lich/thung-nai-dong-thac-bo-moc-chau-2n1d-89780.html?utm_source=admarket&utm_
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: https://muachung.vn/gia-dung-noi-that/combo-10-vien-tay-bon-cau-176957.html?utm_source=admarket&utm_
              Source: mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drString found in binary or memory: https://muachung.vn/gia-dung-noi-that/combo-3-khan-mat-nhat-100-cotton-34x34cm-175139.html?utm_sourc
              Source: tasksche.exe.6.drString found in binary or memory: https://www.google-analytics.com/plugins/ua/linkid.js
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!10_2_004014A6
              Source: Yara matchFile source: tTbeoLWNhb.dll, type: SAMPLE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.228e8c8.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1d760a4.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.22998e8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.229d948.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1d7a104.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000000.1510211339.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1537853597.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2174815751.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1538073196.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1525566306.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1549881056.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2175529883.000000000229D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1525328575.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1550066057.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1510351488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 792, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3904, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
              Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

              System Summary

              barindex
              Source: tTbeoLWNhb.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: tTbeoLWNhb.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1d6b084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.228e8c8.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.228e8c8.11.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.228e8c8.11.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1d760a4.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1d760a4.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.22998e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.22998e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.229d948.10.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.229d948.10.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1d7a104.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1d7a104.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 0000000A.00000000.1537482998.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000002.1548367393.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000000.1547215244.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2174815751.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.1538073196.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.1525566306.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2175529883.000000000229D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.1550066057.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1510351488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 10_2_00406C4010_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 10_2_00402A7610_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 10_2_00402E7E10_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040350F10_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 10_2_00404C1910_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040541F10_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040379710_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 10_2_004043B710_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 10_2_004031BC10_2_004031BC
              Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 372BE1952CBC480EE462D263E3E067B82AE542E7B65789508575642BD960F18E
              Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 372BE1952CBC480EE462D263E3E067B82AE542E7B65789508575642BD960F18E
              Source: mssecsvc.exe.3.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: tTbeoLWNhb.dllBinary or memory string: OriginalFilenamentdll.dllj% vs tTbeoLWNhb.dll
              Source: tTbeoLWNhb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: tTbeoLWNhb.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: tTbeoLWNhb.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1d6b084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.228e8c8.11.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.22c096c.12.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.229d948.10.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1d9d128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1d7a104.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.228e8c8.11.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.228e8c8.11.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1d9d128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1d760a4.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1d760a4.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.22998e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.22998e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.22c096c.12.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.229d948.10.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.229d948.10.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1d7a104.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1d7a104.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000000A.00000000.1537482998.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000002.1548367393.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000000.1547215244.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2174815751.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.1538073196.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.1525566306.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2175529883.000000000229D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.1550066057.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1510351488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 0000000A.00000000.1537482998.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.1548367393.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,10_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6980:120:WilError_03
              Source: tTbeoLWNhb.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\tTbeoLWNhb.dll,PlayGame
              Source: tTbeoLWNhb.dllReversingLabs: Detection: 94%
              Source: tTbeoLWNhb.dllVirustotal: Detection: 93%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\tTbeoLWNhb.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",PlayGame
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\tTbeoLWNhb.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: tTbeoLWNhb.dllStatic file information: File size 5267459 > 1048576
              Source: tTbeoLWNhb.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: Binary string: ntdll.pdb source: tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.dr
              Source: Binary string: ntdll.pdb3 source: tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.dr
              Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 10_2_00407710 push eax; ret 10_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 10_2_004076C8 push eax; ret 10_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3428Thread sleep count: 93 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3428Thread sleep time: -186000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3404Thread sleep count: 131 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3404Thread sleep count: 41 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3428Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
              Source: mssecsvc.exe, 00000006.00000002.1541734957.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhc
              Source: mssecsvc.exe, 00000006.00000002.1541734957.0000000000B54000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2174378063.0000000000CAC000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1551092192.0000000000C9E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1551092192.0000000000C48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000006.00000002.1541734957.0000000000B54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWMv
              Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 10_2_004029CC free,GetProcessHeap,HeapFree,10_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts2
              Service Execution
              1
              DLL Side-Loading
              11
              Process Injection
              31
              Virtualization/Sandbox Evasion
              LSASS Memory121
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS22
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591518 Sample: tTbeoLWNhb.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 49 bg.microsoft.map.fastly.net 2->49 65 Tries to download HTTP data from a sinkholed server 2->65 67 Suricata IDS alerts for network traffic 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 6 other signatures 2->71 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        51 192.168.2.102 unknown unknown 12->51 53 192.168.2.103 unknown unknown 12->53 55 98 other IPs or domains 12->55 81 Connects to many different private IPs via SMB (likely to spread or exploit) 12->81 83 Connects to many different private IPs (likely to spread or exploit) 12->83 signatures6 process7 file8 26 rundll32.exe 16->26         started        63 Drops executables to the windows directory (C:\Windows) and starts them 18->63 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 85 Drops executables to the windows directory (C:\Windows) and starts them 28->85 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 57 Antivirus detection for dropped file 32->57 59 Multi AV Scanner detection for dropped file 32->59 61 Machine Learning detection for dropped file 32->61 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 73 Detected Wannacry Ransomware 38->73 75 Antivirus detection for dropped file 38->75 77 Multi AV Scanner detection for dropped file 38->77 79 Machine Learning detection for dropped file 38->79

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              tTbeoLWNhb.dll95%ReversingLabsWin32.Ransomware.WannaCry
              tTbeoLWNhb.dll93%VirustotalBrowse
              tTbeoLWNhb.dll100%AviraTR/Ransom.Gen
              tTbeoLWNhb.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\mssecsvc.exe100%Joe Sandbox ML
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\mssecsvc.exe93%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://muachung.vn/du-lich/thung-nai-dong-thac-bo-moc-chau-2n1d-89780.html?utm_source=admarket&utm_0%Avira URL Cloudsafe
              http://toolbar.conduit.com/Developer/HtmlAndGadget/Methods/JSInjection.aspx0%Avira URL Cloudsafe
              http://st-n.ads3-adnow.com/js/ta.js0%Avira URL Cloudsafe
              http://quangcao.24h.com.vn/quangcao/2017/03/test17007_bbthanhmai_tremai_9397.html0%Avira URL Cloudsafe
              https://muachung.vn/gia-dung-noi-that/combo-3-khan-mat-nhat-100-cotton-34x34cm-175139.html?utm_sourc0%Avira URL Cloudsafe
              http://quangcao.eva.vn/quangcao/2017/03/test17007_bbthanhmai_giamgia50_9396.html0%Avira URL Cloudsafe
              https://muachung.vn/du-lich/hanh-huong-yen-tu-chua-dong-ba-vang-1-ngay-165493.html?utm_source=admark0%Avira URL Cloudsafe
              https://muachung.vn/gia-dung-noi-that/combo-10-vien-tay-bon-cau-176957.html?utm_source=admarket&utm_0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/llmssecsvc.exe, 0000000B.00000002.1551092192.0000000000C48000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://b.scorecardresearch.com/b?c1=2&c2=10367196&ns__t=1497259682395&ns_c=UTF-8&cv=3.1&c8=Ng%C6%B0%mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                        high
                        http://rtax.criteo.com/delivery/rta/rta.js?netId=3254&cookieName=crtg_vng_rta&rnd=74276450073&varNammssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                          high
                          http://api.adtimaserver.vn/rdext/json2?count=1&zoneId=870285593013603088mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                            high
                            https://muachung.vn/du-lich/thung-nai-dong-thac-bo-moc-chau-2n1d-89780.html?utm_source=admarket&utm_mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://muachung.vn/gia-dung-noi-that/combo-3-khan-mat-nhat-100-cotton-34x34cm-175139.html?utm_sourcmssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://log.adtimaserver.vn/trackpv/?aid=c26abb975506e00158a22c6b553a9c90&category=ct%3Dvi%3Bcategorymssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                              high
                              http://toolbar.conduit.com/Developer/HtmlAndGadget/Methods/JSInjection.aspxmssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://mp3.zing.vn/album/Nhung-Bai-Hat-Hay-Nhat-Cua-Nhu-Quynh-Nhu-Quynh/ZWZBOZOA.htmlCriteomssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.3.drfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://muachung.vn/du-lich/hanh-huong-yen-tu-chua-dong-ba-vang-1-ngay-165493.html?utm_source=admarkmssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://mp3.zing.vn/album/Nhung-Bai-Hat-Hay-Nhat-Cua-Nhu-Quynh-Nhu-Quynh/ZWZBOZOA.htmlScorecardResearmssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                                      high
                                      http://quangcao.eva.vn/quangcao/2017/03/test17007_bbthanhmai_giamgia50_9396.htmltasksche.exe.6.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/imssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://apis.google.com/se/0/_/tasksche.exe.6.drfalse
                                          high
                                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s9mssecsvc.exe, 00000008.00000002.2174378063.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://st-n.ads3-adnow.com/js/ta.jstasksche.exe.6.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://mp3.zing.vn/album/Nhung-Bai-Hat-Hay-Nhat-Cua-Nhu-Quynh-Nhu-Quynh/ZWZBOZOA.htmlAdtimatasksche.exe.6.drfalse
                                              high
                                              http://quangcao.24h.com.vn/quangcao/2017/03/test17007_bbthanhmai_tremai_9397.htmltasksche.exe.6.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://eva.vn/phim-hay/buc-anh-he-lo-nguoi-dan-ong-cuoi-cung-cua-van-trong-song-chung-voi-me-chong-gtasksche.exe.6.drfalse
                                                high
                                                http://api.adtimaserver.vn/renders4?agent=&zones=1894904669163438980mssecsvc.exe, 00000006.00000000.1510351488.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.00000000020A9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000025CD000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 0000000A.00000000.1537510797.000000000070C000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1550066057.0000000000A1C000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1548413990.000000000070C000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                                                  high
                                                  https://muachung.vn/gia-dung-noi-that/combo-10-vien-tay-bon-cau-176957.html?utm_source=admarket&utm_mssecsvc.exe, 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2174815751.0000000001F9F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2175529883.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000000.1538073196.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1547246088.0000000000602000.00000002.00000001.01000000.00000007.sdmp, tTbeoLWNhb.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2173045165.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    5.78.105.2
                                                    unknownIran (ISLAMIC Republic Of)
                                                    16322PARSONLINETehran-IRANIRfalse
                                                    5.78.105.3
                                                    unknownIran (ISLAMIC Republic Of)
                                                    16322PARSONLINETehran-IRANIRfalse
                                                    5.78.105.1
                                                    unknownIran (ISLAMIC Republic Of)
                                                    16322PARSONLINETehran-IRANIRfalse
                                                    1.32.83.1
                                                    unknownMalaysia
                                                    4788TMNET-AS-APTMNetInternetServiceProviderMYfalse
                                                    163.172.72.249
                                                    unknownUnited Kingdom
                                                    12876OnlineSASFRfalse
                                                    203.207.57.154
                                                    unknownIndonesia
                                                    55699STARNET-AS-IDPTCemerlangMultimediaIDfalse
                                                    107.39.6.89
                                                    unknownUnited States
                                                    16567NETRIX-16567USfalse
                                                    219.130.9.1
                                                    unknownChina
                                                    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                                    177.124.25.1
                                                    unknownBrazil
                                                    262315ROALNETSOLUCOESWEBLTDABRfalse
                                                    5.78.105.227
                                                    unknownIran (ISLAMIC Republic Of)
                                                    16322PARSONLINETehran-IRANIRfalse
                                                    107.39.6.1
                                                    unknownUnited States
                                                    16567NETRIX-16567USfalse
                                                    101.229.22.2
                                                    unknownChina
                                                    4812CHINANET-SH-APChinaTelecomGroupCNfalse
                                                    101.229.22.1
                                                    unknownChina
                                                    4812CHINANET-SH-APChinaTelecomGroupCNfalse
                                                    121.178.121.98
                                                    unknownKorea Republic of
                                                    4766KIXS-AS-KRKoreaTelecomKRfalse
                                                    22.150.89.111
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    28.124.93.83
                                                    unknownUnited States
                                                    7922COMCAST-7922USfalse
                                                    177.124.25.37
                                                    unknownBrazil
                                                    262315ROALNETSOLUCOESWEBLTDABRfalse
                                                    181.250.17.1
                                                    unknownColombia
                                                    26611COMCELSACOfalse
                                                    107.227.162.245
                                                    unknownUnited States
                                                    7018ATT-INTERNET4USfalse
                                                    21.90.103.237
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    95.55.13.208
                                                    unknownRussian Federation
                                                    12389ROSTELECOM-ASRUfalse
                                                    215.188.3.1
                                                    unknownUnited States
                                                    721DNIC-ASBLK-00721-00726USfalse
                                                    165.71.85.103
                                                    unknownUnited States
                                                    29885UCHHS-ASUSfalse
                                                    155.74.15.2
                                                    unknownUnited States
                                                    4010DNIC-AS-04010USfalse
                                                    95.55.13.1
                                                    unknownRussian Federation
                                                    12389ROSTELECOM-ASRUfalse
                                                    IP
                                                    192.168.2.148
                                                    192.168.2.149
                                                    192.168.2.146
                                                    192.168.2.147
                                                    192.168.2.140
                                                    192.168.2.141
                                                    192.168.2.144
                                                    192.168.2.145
                                                    192.168.2.142
                                                    192.168.2.143
                                                    192.168.2.159
                                                    192.168.2.157
                                                    192.168.2.158
                                                    192.168.2.151
                                                    192.168.2.152
                                                    192.168.2.150
                                                    192.168.2.155
                                                    192.168.2.156
                                                    192.168.2.153
                                                    192.168.2.154
                                                    192.168.2.126
                                                    192.168.2.247
                                                    192.168.2.127
                                                    192.168.2.248
                                                    192.168.2.124
                                                    192.168.2.245
                                                    192.168.2.125
                                                    192.168.2.246
                                                    192.168.2.128
                                                    192.168.2.249
                                                    192.168.2.129
                                                    192.168.2.240
                                                    192.168.2.122
                                                    192.168.2.243
                                                    192.168.2.123
                                                    192.168.2.244
                                                    192.168.2.120
                                                    192.168.2.241
                                                    192.168.2.121
                                                    192.168.2.242
                                                    192.168.2.97
                                                    192.168.2.137
                                                    192.168.2.96
                                                    192.168.2.138
                                                    192.168.2.99
                                                    192.168.2.135
                                                    192.168.2.98
                                                    192.168.2.136
                                                    192.168.2.139
                                                    192.168.2.250
                                                    192.168.2.130
                                                    192.168.2.251
                                                    192.168.2.91
                                                    192.168.2.90
                                                    192.168.2.93
                                                    192.168.2.133
                                                    192.168.2.254
                                                    192.168.2.92
                                                    192.168.2.134
                                                    192.168.2.95
                                                    192.168.2.131
                                                    192.168.2.252
                                                    192.168.2.94
                                                    192.168.2.132
                                                    192.168.2.253
                                                    192.168.2.104
                                                    192.168.2.225
                                                    192.168.2.105
                                                    192.168.2.226
                                                    192.168.2.102
                                                    192.168.2.223
                                                    192.168.2.103
                                                    192.168.2.224
                                                    192.168.2.108
                                                    192.168.2.229
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1591518
                                                    Start date and time:2025-01-15 02:51:18 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 5m 27s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:16
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:tTbeoLWNhb.dll
                                                    renamed because original name is a hash value
                                                    Original Sample Name:4c58581fa08accc15994f3db1098a5bc.dll
                                                    Detection:MAL
                                                    Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                                    EGA Information:
                                                    • Successful, ratio: 66.7%
                                                    HCA Information:Failed
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .dll
                                                    • Stop behavior analysis, all processes terminated
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                                    • Excluded IPs from analysis (whitelisted): 52.149.20.212, 199.232.214.172, 2.23.77.188, 13.85.23.206, 52.165.164.15, 13.107.246.45
                                                    • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target tasksche.exe, PID 6168 because there are no executed function
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    TimeTypeDescription
                                                    20:52:30API Interceptor1x Sleep call for process: loaddll32.exe modified
                                                    20:53:04API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comv9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.167.228
                                                    bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.167.228
                                                    hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.167.228
                                                    sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.166.228
                                                    hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.167.228
                                                    87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.166.228
                                                    Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.167.228
                                                    5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.166.228
                                                    9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.166.228
                                                    k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                                                    • 104.16.167.228
                                                    bg.microsoft.map.fastly.netDocument-01-16-25.pdfGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    Eastern Contractors Corporation Contract and submittal document.emlGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                                    • 199.232.214.172
                                                    https://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
                                                    • 199.232.214.172
                                                    jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                                    • 199.232.214.172
                                                    logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                                                    • 199.232.214.172
                                                    DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    PARSONLINETehran-IRANIRhttps://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                                    • 188.245.202.211
                                                    http://cipassoitalia.itGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                    • 188.245.212.29
                                                    aD7D9fkpII.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    installer.batGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    skript.batGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    din.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    yoda.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    lem.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    script.ps1Get hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    PodcastsTries.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    PARSONLINETehran-IRANIRhttps://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                                    • 188.245.202.211
                                                    http://cipassoitalia.itGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                    • 188.245.212.29
                                                    aD7D9fkpII.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    installer.batGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    skript.batGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    din.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    yoda.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    lem.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    script.ps1Get hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    PodcastsTries.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    PARSONLINETehran-IRANIRhttps://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                                    • 188.245.202.211
                                                    http://cipassoitalia.itGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                    • 188.245.212.29
                                                    aD7D9fkpII.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    installer.batGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    skript.batGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    din.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    yoda.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    lem.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    script.ps1Get hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    PodcastsTries.exeGet hashmaliciousVidarBrowse
                                                    • 188.245.216.205
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Windows\tasksche.exeu6J827hhVw.dllGet hashmaliciousWannacryBrowse
                                                      C:\WINDOWS\qeriuwjhrf (copy)u6J827hhVw.dllGet hashmaliciousWannacryBrowse
                                                        Process:C:\Windows\mssecsvc.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):3514368
                                                        Entropy (8bit):6.679837028931889
                                                        Encrypted:false
                                                        SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA8Kx/aa56Lx:QqPoBhz1aRxcSUDk36SANKx/ag6Lx
                                                        MD5:82246A37BC2B94A29240A8B49DE5CF57
                                                        SHA1:60D6DF7C05D3A037ADB5FF61A563A7AE7AB00F36
                                                        SHA-256:372BE1952CBC480EE462D263E3E067B82AE542E7B65789508575642BD960F18E
                                                        SHA-512:047CAB5FB0EF6BF88DB1FE2FBF7200CF810A1B057E9B3488E32A6D8CF96DD56E9D397C5DC16885F48ACA4D858A3612AF74284819E50006E3279BCF9642200289
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                        Joe Sandbox View:
                                                        • Filename: u6J827hhVw.dll, Detection: malicious, Browse
                                                        Reputation:low
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):3723264
                                                        Entropy (8bit):6.672529088248042
                                                        Encrypted:false
                                                        SSDEEP:49152:XnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA8Kx/aa56L:XDqPoBhz1aRxcSUDk36SANKx/ag6L
                                                        MD5:9BCD08D46432B6DAC27417B0DE3DA8B1
                                                        SHA1:D16FAE609A6CC1049FB008039555C2CC67DB8638
                                                        SHA-256:4BEAB4D0D34AA39DAECD1846D8A574AACBDA506618BDBABC3FFEEA46E121E774
                                                        SHA-512:B987E4B323FC59B82B71F4F5E0FE71B0324811247AB488C19688CDC1430322DEAADB6B73528178277B3AC9E3E89F5F938381B768839D99E7A72600EA5DFD636A
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 93%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\mssecsvc.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):3514368
                                                        Entropy (8bit):6.679837028931889
                                                        Encrypted:false
                                                        SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA8Kx/aa56Lx:QqPoBhz1aRxcSUDk36SANKx/ag6Lx
                                                        MD5:82246A37BC2B94A29240A8B49DE5CF57
                                                        SHA1:60D6DF7C05D3A037ADB5FF61A563A7AE7AB00F36
                                                        SHA-256:372BE1952CBC480EE462D263E3E067B82AE542E7B65789508575642BD960F18E
                                                        SHA-512:047CAB5FB0EF6BF88DB1FE2FBF7200CF810A1B057E9B3488E32A6D8CF96DD56E9D397C5DC16885F48ACA4D858A3612AF74284819E50006E3279BCF9642200289
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                        Joe Sandbox View:
                                                        • Filename: u6J827hhVw.dll, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):5.130986261798626
                                                        TrID:
                                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                                        • DOS Executable Generic (2002/1) 0.20%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:tTbeoLWNhb.dll
                                                        File size:5'267'459 bytes
                                                        MD5:4c58581fa08accc15994f3db1098a5bc
                                                        SHA1:1a349b33c6cc821b814138eb9619fcbce20e6eda
                                                        SHA256:7ab78920ad07396864187254f5323571807df03ca90c6b5eab2d1c8d0c27b4d5
                                                        SHA512:99e85447b5c2a3380cb9add92c5ca2ded417cdc1de2fbc3655b32014a53fd7202cdf6cda6955bbc8605bd6667cffafc9df3a04b10e0dcf15079481ede3b62da1
                                                        SSDEEP:49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA8Kx/aa56L:TDqPoBhz1aRxcSUDk36SANKx/ag6L
                                                        TLSH:15369C42A3F94619F2F63F3059BA17706F7ABC92A97DC60E1280516E1DB1E40CDB1B63
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                        Icon Hash:7ae282899bbab082
                                                        Entrypoint:0x100011e9
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x10000000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                        DLL Characteristics:
                                                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                        Instruction
                                                        push ebp
                                                        mov ebp, esp
                                                        push ebx
                                                        mov ebx, dword ptr [ebp+08h]
                                                        push esi
                                                        mov esi, dword ptr [ebp+0Ch]
                                                        push edi
                                                        mov edi, dword ptr [ebp+10h]
                                                        test esi, esi
                                                        jne 00007F9F81547A7Bh
                                                        cmp dword ptr [10003140h], 00000000h
                                                        jmp 00007F9F81547A98h
                                                        cmp esi, 01h
                                                        je 00007F9F81547A77h
                                                        cmp esi, 02h
                                                        jne 00007F9F81547A94h
                                                        mov eax, dword ptr [10003150h]
                                                        test eax, eax
                                                        je 00007F9F81547A7Bh
                                                        push edi
                                                        push esi
                                                        push ebx
                                                        call eax
                                                        test eax, eax
                                                        je 00007F9F81547A7Eh
                                                        push edi
                                                        push esi
                                                        push ebx
                                                        call 00007F9F8154798Ah
                                                        test eax, eax
                                                        jne 00007F9F81547A76h
                                                        xor eax, eax
                                                        jmp 00007F9F81547AC0h
                                                        push edi
                                                        push esi
                                                        push ebx
                                                        call 00007F9F8154783Ch
                                                        cmp esi, 01h
                                                        mov dword ptr [ebp+0Ch], eax
                                                        jne 00007F9F81547A7Eh
                                                        test eax, eax
                                                        jne 00007F9F81547AA9h
                                                        push edi
                                                        push eax
                                                        push ebx
                                                        call 00007F9F81547966h
                                                        test esi, esi
                                                        je 00007F9F81547A77h
                                                        cmp esi, 03h
                                                        jne 00007F9F81547A98h
                                                        push edi
                                                        push esi
                                                        push ebx
                                                        call 00007F9F81547955h
                                                        test eax, eax
                                                        jne 00007F9F81547A75h
                                                        and dword ptr [ebp+0Ch], eax
                                                        cmp dword ptr [ebp+0Ch], 00000000h
                                                        je 00007F9F81547A83h
                                                        mov eax, dword ptr [10003150h]
                                                        test eax, eax
                                                        je 00007F9F81547A7Ah
                                                        push edi
                                                        push esi
                                                        push ebx
                                                        call eax
                                                        mov dword ptr [ebp+0Ch], eax
                                                        mov eax, dword ptr [ebp+0Ch]
                                                        pop edi
                                                        pop esi
                                                        pop ebx
                                                        pop ebp
                                                        retn 000Ch
                                                        jmp dword ptr [10002028h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        Programming Language:
                                                        • [ C ] VS98 (6.0) build 8168
                                                        • [C++] VS98 (6.0) build 8168
                                                        • [RES] VS98 (6.0) cvtres build 1720
                                                        • [LNK] VS98 (6.0) imp/exp build 8168
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x40000x5000600x501000ce779cfbc39a87e5ea501859118f27b5unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        W0x40600x500000dataEnglishUnited States0.8770942687988281
                                                        DLLImport
                                                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                        NameOrdinalAddress
                                                        PlayGame10x10001114
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2025-01-15T02:52:28.759322+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8572461.1.1.153UDP
                                                        2025-01-15T02:52:29.281342+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849706104.16.167.22880TCP
                                                        2025-01-15T02:52:29.281342+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849706104.16.167.22880TCP
                                                        2025-01-15T02:52:29.281342+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849706104.16.167.22880TCP
                                                        2025-01-15T02:52:29.281342+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849706104.16.167.22880TCP
                                                        2025-01-15T02:52:29.281342+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849706104.16.167.22880TCP
                                                        2025-01-15T02:52:29.281978+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849706TCP
                                                        2025-01-15T02:52:30.686897+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849707104.16.167.22880TCP
                                                        2025-01-15T02:52:30.686897+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849707104.16.167.22880TCP
                                                        2025-01-15T02:52:30.686897+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849707104.16.167.22880TCP
                                                        2025-01-15T02:52:30.686897+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849707104.16.167.22880TCP
                                                        2025-01-15T02:52:30.686897+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849707104.16.167.22880TCP
                                                        2025-01-15T02:52:30.686912+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849707TCP
                                                        2025-01-15T02:52:31.685914+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849719104.16.167.22880TCP
                                                        2025-01-15T02:52:31.685914+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849719104.16.167.22880TCP
                                                        2025-01-15T02:52:31.685914+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849719104.16.167.22880TCP
                                                        2025-01-15T02:52:31.685914+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849719104.16.167.22880TCP
                                                        2025-01-15T02:52:31.685914+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849719104.16.167.22880TCP
                                                        2025-01-15T02:52:31.686298+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849719TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 15, 2025 02:52:22.727521896 CET49676443192.168.2.852.182.143.211
                                                        Jan 15, 2025 02:52:22.758711100 CET49673443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:23.149352074 CET49672443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:25.196249008 CET4967780192.168.2.8192.229.211.108
                                                        Jan 15, 2025 02:52:28.773701906 CET4970680192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:28.778582096 CET8049706104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:28.778669119 CET4970680192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:28.778832912 CET4970680192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:28.783684015 CET8049706104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:29.281239986 CET8049706104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:29.281342030 CET4970680192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:29.281977892 CET8049706104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:29.282207012 CET4970680192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:29.341025114 CET4970680192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:29.345853090 CET8049706104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.013470888 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.018327951 CET8049707104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.018400908 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.018604040 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.024473906 CET8049707104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.686815023 CET8049707104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.686855078 CET8049707104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.686897039 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.686897039 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.686912060 CET8049707104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.686950922 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.686991930 CET4970780192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:30.692105055 CET8049707104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:30.769743919 CET49708445192.168.2.828.124.93.83
                                                        Jan 15, 2025 02:52:30.774667025 CET4454970828.124.93.83192.168.2.8
                                                        Jan 15, 2025 02:52:30.774791956 CET49708445192.168.2.828.124.93.83
                                                        Jan 15, 2025 02:52:30.774791956 CET49708445192.168.2.828.124.93.83
                                                        Jan 15, 2025 02:52:30.775166035 CET49709445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.779925108 CET4454970828.124.93.83192.168.2.8
                                                        Jan 15, 2025 02:52:30.779970884 CET4454970928.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:30.780014038 CET49708445192.168.2.828.124.93.83
                                                        Jan 15, 2025 02:52:30.780060053 CET49709445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.780119896 CET49709445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.784957886 CET4454970928.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:30.785027981 CET49709445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.785682917 CET49710445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.790457964 CET4454971028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:30.790616035 CET49710445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.790669918 CET49710445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:30.795417070 CET4454971028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:31.199167013 CET4971980192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:31.204034090 CET8049719104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:31.204118013 CET4971980192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:31.204535007 CET4971980192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:31.209315062 CET8049719104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:31.685693979 CET8049719104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:31.685914040 CET4971980192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:31.686005116 CET4971980192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:31.686297894 CET8049719104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:31.688025951 CET4971980192.168.2.8104.16.167.228
                                                        Jan 15, 2025 02:52:31.690711021 CET8049719104.16.167.228192.168.2.8
                                                        Jan 15, 2025 02:52:32.372613907 CET49673443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:32.758738995 CET49672443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:32.761460066 CET49734445192.168.2.8152.30.194.67
                                                        Jan 15, 2025 02:52:32.766226053 CET44549734152.30.194.67192.168.2.8
                                                        Jan 15, 2025 02:52:32.769326925 CET49734445192.168.2.8152.30.194.67
                                                        Jan 15, 2025 02:52:32.769412041 CET49734445192.168.2.8152.30.194.67
                                                        Jan 15, 2025 02:52:32.769789934 CET49735445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.774393082 CET44549734152.30.194.67192.168.2.8
                                                        Jan 15, 2025 02:52:32.774565935 CET49734445192.168.2.8152.30.194.67
                                                        Jan 15, 2025 02:52:32.774607897 CET44549735152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:32.775333881 CET49735445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.775333881 CET49735445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.776864052 CET49736445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.780309916 CET44549735152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:32.780319929 CET44549735152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:32.780610085 CET49735445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.781647921 CET44549736152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:32.781754971 CET49736445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.781754971 CET49736445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:32.786562920 CET44549736152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:34.805459023 CET49759445192.168.2.8101.229.22.26
                                                        Jan 15, 2025 02:52:35.426258087 CET4434970523.206.229.226192.168.2.8
                                                        Jan 15, 2025 02:52:35.426464081 CET49705443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:35.426609993 CET4434970523.206.229.226192.168.2.8
                                                        Jan 15, 2025 02:52:35.426651001 CET49705443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:35.426897049 CET4434970523.206.229.226192.168.2.8
                                                        Jan 15, 2025 02:52:35.426942110 CET49705443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:35.427113056 CET4434970523.206.229.226192.168.2.8
                                                        Jan 15, 2025 02:52:35.427150011 CET49705443192.168.2.823.206.229.226
                                                        Jan 15, 2025 02:52:35.427807093 CET44549759101.229.22.26192.168.2.8
                                                        Jan 15, 2025 02:52:35.427886963 CET49759445192.168.2.8101.229.22.26
                                                        Jan 15, 2025 02:52:35.427936077 CET49759445192.168.2.8101.229.22.26
                                                        Jan 15, 2025 02:52:35.428214073 CET49766445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.432981014 CET44549766101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:35.433089972 CET44549759101.229.22.26192.168.2.8
                                                        Jan 15, 2025 02:52:35.433119059 CET49766445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.433137894 CET49759445192.168.2.8101.229.22.26
                                                        Jan 15, 2025 02:52:35.433193922 CET49766445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.434717894 CET49767445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.438051939 CET44549766101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:35.438127041 CET49766445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.439532042 CET44549767101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:35.439613104 CET49767445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.439662933 CET49767445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:35.444377899 CET44549767101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:36.806798935 CET49782445192.168.2.8121.178.121.98
                                                        Jan 15, 2025 02:52:36.811670065 CET44549782121.178.121.98192.168.2.8
                                                        Jan 15, 2025 02:52:36.811737061 CET49782445192.168.2.8121.178.121.98
                                                        Jan 15, 2025 02:52:36.811803102 CET49782445192.168.2.8121.178.121.98
                                                        Jan 15, 2025 02:52:36.812026978 CET49783445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.816761017 CET44549782121.178.121.98192.168.2.8
                                                        Jan 15, 2025 02:52:36.816823006 CET49782445192.168.2.8121.178.121.98
                                                        Jan 15, 2025 02:52:36.816883087 CET44549783121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:36.816942930 CET49783445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.816996098 CET49783445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.818191051 CET49784445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.821863890 CET44549783121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:36.821930885 CET49783445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.822985888 CET44549784121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:36.823076963 CET49784445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.823298931 CET49784445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:36.828063965 CET44549784121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:38.822112083 CET49804445192.168.2.822.150.89.111
                                                        Jan 15, 2025 02:52:38.826909065 CET4454980422.150.89.111192.168.2.8
                                                        Jan 15, 2025 02:52:38.827025890 CET49804445192.168.2.822.150.89.111
                                                        Jan 15, 2025 02:52:38.827050924 CET49804445192.168.2.822.150.89.111
                                                        Jan 15, 2025 02:52:38.827178001 CET49805445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.832441092 CET4454980422.150.89.111192.168.2.8
                                                        Jan 15, 2025 02:52:38.832456112 CET4454980522.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:52:38.832494020 CET49804445192.168.2.822.150.89.111
                                                        Jan 15, 2025 02:52:38.832535982 CET49805445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.832616091 CET49805445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.833542109 CET49806445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.837512016 CET4454980522.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:52:38.837574005 CET49805445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.838396072 CET4454980622.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:52:38.838471889 CET49806445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.838511944 CET49806445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:52:38.843297958 CET4454980622.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:52:40.838110924 CET49827445192.168.2.8203.207.57.154
                                                        Jan 15, 2025 02:52:40.845405102 CET44549827203.207.57.154192.168.2.8
                                                        Jan 15, 2025 02:52:40.845482111 CET49827445192.168.2.8203.207.57.154
                                                        Jan 15, 2025 02:52:40.845530987 CET49827445192.168.2.8203.207.57.154
                                                        Jan 15, 2025 02:52:40.845721960 CET49828445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.851999044 CET44549827203.207.57.154192.168.2.8
                                                        Jan 15, 2025 02:52:40.852014065 CET44549828203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:52:40.852058887 CET49827445192.168.2.8203.207.57.154
                                                        Jan 15, 2025 02:52:40.852102995 CET49828445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.852149010 CET49828445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.853176117 CET49829445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.857089043 CET44549828203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:52:40.857136011 CET49828445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.857971907 CET44549829203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:52:40.858213902 CET49829445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.858213902 CET49829445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:52:40.863074064 CET44549829203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.840317011 CET44549736152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.840396881 CET49736445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:42.840471983 CET49736445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:42.840516090 CET49736445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:42.845302105 CET44549736152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.845313072 CET44549736152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.852826118 CET49852445192.168.2.8157.182.126.93
                                                        Jan 15, 2025 02:52:42.857726097 CET44549852157.182.126.93192.168.2.8
                                                        Jan 15, 2025 02:52:42.857815027 CET49852445192.168.2.8157.182.126.93
                                                        Jan 15, 2025 02:52:42.857851028 CET49852445192.168.2.8157.182.126.93
                                                        Jan 15, 2025 02:52:42.858087063 CET49853445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.862760067 CET44549852157.182.126.93192.168.2.8
                                                        Jan 15, 2025 02:52:42.862823963 CET49852445192.168.2.8157.182.126.93
                                                        Jan 15, 2025 02:52:42.862904072 CET44549853157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.862967968 CET49853445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.863039970 CET49853445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.863292933 CET49854445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.867918968 CET44549853157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.867981911 CET49853445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.868032932 CET44549854157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:52:42.868093967 CET49854445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.868118048 CET49854445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:52:42.872937918 CET44549854157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:52:44.868886948 CET49880445192.168.2.8107.227.162.245
                                                        Jan 15, 2025 02:52:44.873831034 CET44549880107.227.162.245192.168.2.8
                                                        Jan 15, 2025 02:52:44.873914957 CET49880445192.168.2.8107.227.162.245
                                                        Jan 15, 2025 02:52:44.874062061 CET49880445192.168.2.8107.227.162.245
                                                        Jan 15, 2025 02:52:44.874208927 CET49881445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.878922939 CET44549880107.227.162.245192.168.2.8
                                                        Jan 15, 2025 02:52:44.878974915 CET49880445192.168.2.8107.227.162.245
                                                        Jan 15, 2025 02:52:44.878983021 CET44549881107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:52:44.879038095 CET49881445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.879123926 CET49881445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.879440069 CET49882445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.884008884 CET44549881107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:52:44.884054899 CET49881445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.884330034 CET44549882107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:52:44.884393930 CET49882445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.884432077 CET49882445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:52:44.889244080 CET44549882107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:52:45.852741003 CET49895445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:45.857603073 CET44549895152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:45.858721972 CET49895445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:45.858721972 CET49895445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:45.863542080 CET44549895152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:46.884584904 CET49907445192.168.2.8155.74.15.15
                                                        Jan 15, 2025 02:52:46.889425039 CET44549907155.74.15.15192.168.2.8
                                                        Jan 15, 2025 02:52:46.889502048 CET49907445192.168.2.8155.74.15.15
                                                        Jan 15, 2025 02:52:46.889580965 CET49907445192.168.2.8155.74.15.15
                                                        Jan 15, 2025 02:52:46.889797926 CET49908445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.894481897 CET44549907155.74.15.15192.168.2.8
                                                        Jan 15, 2025 02:52:46.894539118 CET49907445192.168.2.8155.74.15.15
                                                        Jan 15, 2025 02:52:46.894593000 CET44549908155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:52:46.894682884 CET49908445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.894682884 CET49908445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.895098925 CET49909445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.899611950 CET44549908155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:52:46.899943113 CET44549909155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:52:46.899974108 CET49908445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.900017023 CET49909445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.900063038 CET49909445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:52:46.904911995 CET44549909155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:52:48.902143002 CET49932445192.168.2.855.167.153.133
                                                        Jan 15, 2025 02:52:48.909235001 CET4454993255.167.153.133192.168.2.8
                                                        Jan 15, 2025 02:52:48.909320116 CET49932445192.168.2.855.167.153.133
                                                        Jan 15, 2025 02:52:48.909358978 CET49932445192.168.2.855.167.153.133
                                                        Jan 15, 2025 02:52:48.909533024 CET49933445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.916148901 CET4454993355.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:52:48.916212082 CET49933445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.916235924 CET49933445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.916737080 CET49934445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.916897058 CET4454993255.167.153.133192.168.2.8
                                                        Jan 15, 2025 02:52:48.917063951 CET4454993255.167.153.133192.168.2.8
                                                        Jan 15, 2025 02:52:48.917119980 CET49932445192.168.2.855.167.153.133
                                                        Jan 15, 2025 02:52:48.923578978 CET4454993355.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:52:48.923629999 CET49933445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.923748016 CET4454993455.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:52:48.923831940 CET49934445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.923831940 CET49934445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:52:48.930680990 CET4454993455.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:52:50.915555954 CET49956445192.168.2.81.32.83.223
                                                        Jan 15, 2025 02:52:50.920425892 CET445499561.32.83.223192.168.2.8
                                                        Jan 15, 2025 02:52:50.920583963 CET49956445192.168.2.81.32.83.223
                                                        Jan 15, 2025 02:52:50.920619011 CET49956445192.168.2.81.32.83.223
                                                        Jan 15, 2025 02:52:50.920936108 CET49957445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.925561905 CET445499561.32.83.223192.168.2.8
                                                        Jan 15, 2025 02:52:50.925611973 CET49956445192.168.2.81.32.83.223
                                                        Jan 15, 2025 02:52:50.925734997 CET445499571.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:52:50.925791979 CET49957445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.925817013 CET49957445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.926063061 CET49958445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.930718899 CET445499571.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:52:50.930772066 CET49957445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.930830002 CET445499581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:52:50.930886030 CET49958445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.930913925 CET49958445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:52:50.935735941 CET445499581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.137465954 CET4454971028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.137597084 CET49710445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:52.137644053 CET49710445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:52.137725115 CET49710445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:52.142381907 CET4454971028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.142538071 CET4454971028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.930969000 CET49981445192.168.2.8106.127.87.62
                                                        Jan 15, 2025 02:52:52.935827971 CET44549981106.127.87.62192.168.2.8
                                                        Jan 15, 2025 02:52:52.935982943 CET49981445192.168.2.8106.127.87.62
                                                        Jan 15, 2025 02:52:52.936100006 CET49981445192.168.2.8106.127.87.62
                                                        Jan 15, 2025 02:52:52.936397076 CET49982445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.940996885 CET44549981106.127.87.62192.168.2.8
                                                        Jan 15, 2025 02:52:52.941056967 CET49981445192.168.2.8106.127.87.62
                                                        Jan 15, 2025 02:52:52.941154003 CET44549982106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.941206932 CET49982445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.941261053 CET49982445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.941606045 CET49983445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.946185112 CET44549982106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.946269035 CET49982445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.946367025 CET44549983106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:52:52.946423054 CET49983445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.946455002 CET49983445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:52:52.951189995 CET44549983106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:52:54.946672916 CET50005445192.168.2.854.57.185.99
                                                        Jan 15, 2025 02:52:54.951574087 CET4455000554.57.185.99192.168.2.8
                                                        Jan 15, 2025 02:52:54.951662064 CET50005445192.168.2.854.57.185.99
                                                        Jan 15, 2025 02:52:54.951687098 CET50005445192.168.2.854.57.185.99
                                                        Jan 15, 2025 02:52:54.951809883 CET50006445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.956640005 CET4455000554.57.185.99192.168.2.8
                                                        Jan 15, 2025 02:52:54.956693888 CET4455000654.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:52:54.956697941 CET50005445192.168.2.854.57.185.99
                                                        Jan 15, 2025 02:52:54.956760883 CET50006445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.956808090 CET50006445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.957027912 CET50007445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.961725950 CET4455000654.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:52:54.961791992 CET50006445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.961885929 CET4455000754.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:52:54.961940050 CET50007445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.962052107 CET50007445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:52:54.966927052 CET4455000754.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:52:55.149739981 CET50010445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:55.154670954 CET4455001028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:55.154757977 CET50010445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:55.154808044 CET50010445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:52:55.159617901 CET4455001028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:52:55.918773890 CET44549895152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:55.919043064 CET49895445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:55.919043064 CET49895445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:55.919043064 CET49895445192.168.2.8152.30.194.1
                                                        Jan 15, 2025 02:52:55.923955917 CET44549895152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:55.924040079 CET44549895152.30.194.1192.168.2.8
                                                        Jan 15, 2025 02:52:55.977787018 CET50013445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.982682943 CET44550013152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:52:55.982752085 CET50013445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.982815981 CET50013445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.983283043 CET50014445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.987710953 CET44550013152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:52:55.987768888 CET50013445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.988157988 CET44550014152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:52:55.988220930 CET50014445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.988265991 CET50014445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:52:55.993185997 CET44550014152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:52:56.810050011 CET44549767101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:56.810146093 CET49767445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:56.829590082 CET49767445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:56.829732895 CET49767445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:56.834456921 CET44549767101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:56.834598064 CET44549767101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:56.971743107 CET50015445192.168.2.8215.188.3.11
                                                        Jan 15, 2025 02:52:56.976696014 CET44550015215.188.3.11192.168.2.8
                                                        Jan 15, 2025 02:52:56.976814032 CET50015445192.168.2.8215.188.3.11
                                                        Jan 15, 2025 02:52:56.976890087 CET50015445192.168.2.8215.188.3.11
                                                        Jan 15, 2025 02:52:56.977049112 CET50016445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.981913090 CET44550015215.188.3.11192.168.2.8
                                                        Jan 15, 2025 02:52:56.981996059 CET50015445192.168.2.8215.188.3.11
                                                        Jan 15, 2025 02:52:56.982089996 CET44550016215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:52:56.982168913 CET50016445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.982233047 CET50016445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.987351894 CET44550016215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:52:56.987427950 CET50016445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.989978075 CET50017445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.994914055 CET44550017215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:52:56.995050907 CET50017445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.995089054 CET50017445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:52:56.999948025 CET44550017215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.199948072 CET44549784121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.200032949 CET49784445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:58.200095892 CET49784445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:58.200176954 CET49784445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:52:58.204813957 CET44549784121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.204916000 CET44549784121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.977933884 CET50018445192.168.2.8163.125.116.6
                                                        Jan 15, 2025 02:52:58.982744932 CET44550018163.125.116.6192.168.2.8
                                                        Jan 15, 2025 02:52:58.984632015 CET50018445192.168.2.8163.125.116.6
                                                        Jan 15, 2025 02:52:58.984647989 CET50018445192.168.2.8163.125.116.6
                                                        Jan 15, 2025 02:52:58.984810114 CET50019445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:52:58.989675999 CET44550019163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.989926100 CET44550018163.125.116.6192.168.2.8
                                                        Jan 15, 2025 02:52:58.990000010 CET50018445192.168.2.8163.125.116.6
                                                        Jan 15, 2025 02:52:58.990267038 CET50020445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:52:58.990272999 CET50019445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:52:58.995076895 CET44550020163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.995244980 CET44550019163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:52:58.995352983 CET50019445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:52:58.995357037 CET50020445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:52:58.995408058 CET50020445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:52:59.000222921 CET44550020163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:52:59.837297916 CET50021445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:59.842158079 CET44550021101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:52:59.844435930 CET50021445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:59.849272966 CET50021445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:52:59.854027033 CET44550021101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:53:00.282246113 CET4454980622.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:00.282306910 CET49806445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:00.282361984 CET49806445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:00.282435894 CET49806445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:00.287209034 CET4454980622.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:00.287223101 CET4454980622.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:00.993674040 CET50022445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.000881910 CET44550022219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.000993967 CET50022445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.001022100 CET50022445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.001199961 CET50023445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.008657932 CET44550023219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.008749962 CET50023445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.008810043 CET50023445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.009123087 CET50024445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.009332895 CET44550022219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.009396076 CET50022445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.016999006 CET44550024219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.017163038 CET50024445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.017163038 CET50024445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.017551899 CET44550023219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.017612934 CET50023445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:01.024717093 CET44550024219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.212130070 CET50025445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:53:01.217984915 CET44550025121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:53:01.221913099 CET50025445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:53:01.221973896 CET50025445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:53:01.227502108 CET44550025121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:53:02.217499018 CET44549829203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:02.217618942 CET49829445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:02.217618942 CET49829445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:02.217689037 CET49829445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:02.222464085 CET44549829203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:02.222475052 CET44549829203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.009215117 CET50026445192.168.2.847.41.183.0
                                                        Jan 15, 2025 02:53:03.014111996 CET4455002647.41.183.0192.168.2.8
                                                        Jan 15, 2025 02:53:03.014179945 CET50026445192.168.2.847.41.183.0
                                                        Jan 15, 2025 02:53:03.014249086 CET50026445192.168.2.847.41.183.0
                                                        Jan 15, 2025 02:53:03.014394999 CET50027445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.019144058 CET4455002647.41.183.0192.168.2.8
                                                        Jan 15, 2025 02:53:03.019220114 CET4455002747.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.019253969 CET50026445192.168.2.847.41.183.0
                                                        Jan 15, 2025 02:53:03.019356012 CET50027445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.019433022 CET50027445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.019829035 CET50028445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.024331093 CET4455002747.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.024384022 CET4455002747.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.024429083 CET50027445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.024591923 CET4455002847.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.024647951 CET50028445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.024678946 CET50028445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:03.029486895 CET4455002847.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.290487051 CET50029445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:03.295229912 CET4455002922.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.295339108 CET50029445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:03.295387030 CET50029445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:03.300148964 CET4455002922.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:04.215661049 CET44549854157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:04.215718985 CET49854445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:04.215769053 CET49854445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:04.215769053 CET49854445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:04.220557928 CET44549854157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:04.220572948 CET44549854157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:05.162777901 CET50030445192.168.2.8177.124.25.37
                                                        Jan 15, 2025 02:53:05.167682886 CET44550030177.124.25.37192.168.2.8
                                                        Jan 15, 2025 02:53:05.167754889 CET50030445192.168.2.8177.124.25.37
                                                        Jan 15, 2025 02:53:05.193377018 CET50030445192.168.2.8177.124.25.37
                                                        Jan 15, 2025 02:53:05.193566084 CET50031445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.198256969 CET44550030177.124.25.37192.168.2.8
                                                        Jan 15, 2025 02:53:05.198417902 CET50030445192.168.2.8177.124.25.37
                                                        Jan 15, 2025 02:53:05.198470116 CET44550031177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:05.198548079 CET50031445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.222966909 CET50031445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.227848053 CET44550031177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:05.228002071 CET50031445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.237704992 CET50032445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:05.242516994 CET44550032203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:05.242578983 CET50032445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:05.242868900 CET50032445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:05.247661114 CET44550032203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:05.259038925 CET50033445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.263928890 CET44550033177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:05.264000893 CET50033445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.266592979 CET50033445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:05.271368980 CET44550033177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:06.055854082 CET44550014152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:06.056021929 CET50014445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:06.056096077 CET50014445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:06.056149006 CET50014445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:06.060969114 CET44550014152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:06.061060905 CET44550014152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:06.250874996 CET44549882107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:06.250932932 CET49882445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:06.250957966 CET49882445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:06.250993967 CET49882445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:06.255758047 CET44549882107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:06.255769968 CET44549882107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:07.040452003 CET50034445192.168.2.8156.145.218.214
                                                        Jan 15, 2025 02:53:07.045284033 CET44550034156.145.218.214192.168.2.8
                                                        Jan 15, 2025 02:53:07.048206091 CET50034445192.168.2.8156.145.218.214
                                                        Jan 15, 2025 02:53:07.048223972 CET50034445192.168.2.8156.145.218.214
                                                        Jan 15, 2025 02:53:07.048371077 CET50035445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.053185940 CET44550035156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:07.053200006 CET44550034156.145.218.214192.168.2.8
                                                        Jan 15, 2025 02:53:07.053266048 CET50034445192.168.2.8156.145.218.214
                                                        Jan 15, 2025 02:53:07.053352118 CET50035445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.053352118 CET50035445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.053566933 CET50036445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.058265924 CET44550035156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:07.058331013 CET44550036156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:07.058377981 CET50035445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.058408022 CET50036445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.058428049 CET50036445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:07.063137054 CET44550036156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:07.227653027 CET50037445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:07.232428074 CET44550037157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:07.232644081 CET50037445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:07.232707977 CET50037445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:07.237488031 CET44550037157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.280086040 CET44549909155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.280141115 CET49909445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:08.280194044 CET49909445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:08.280431986 CET49909445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:08.284970045 CET44549909155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.285190105 CET44549909155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.790456057 CET50038445192.168.2.8107.39.6.89
                                                        Jan 15, 2025 02:53:08.795918941 CET44550038107.39.6.89192.168.2.8
                                                        Jan 15, 2025 02:53:08.795994997 CET50038445192.168.2.8107.39.6.89
                                                        Jan 15, 2025 02:53:08.796020031 CET50038445192.168.2.8107.39.6.89
                                                        Jan 15, 2025 02:53:08.796139002 CET50039445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.801558971 CET44550038107.39.6.89192.168.2.8
                                                        Jan 15, 2025 02:53:08.801605940 CET50038445192.168.2.8107.39.6.89
                                                        Jan 15, 2025 02:53:08.802196026 CET44550039107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.802252054 CET50039445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.802283049 CET50039445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.802659035 CET50040445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.807461023 CET44550040107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.807543039 CET50040445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.807543039 CET50040445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.807579041 CET44550039107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:08.807619095 CET50039445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:08.812489033 CET44550040107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:09.071571112 CET50041445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:09.076426029 CET44550041152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:09.076525927 CET50041445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:09.076546907 CET50041445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:09.081315994 CET44550041152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:09.258929968 CET50042445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:09.263801098 CET44550042107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:09.265949011 CET50042445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:09.265965939 CET50042445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:09.271450996 CET44550042107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.293983936 CET4454993455.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.294188023 CET49934445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:10.294254065 CET49934445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:10.294301987 CET49934445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:10.299355984 CET4454993455.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.300514936 CET4454993455.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.431472063 CET50043445192.168.2.8163.172.72.249
                                                        Jan 15, 2025 02:53:10.438427925 CET44550043163.172.72.249192.168.2.8
                                                        Jan 15, 2025 02:53:10.438519001 CET50043445192.168.2.8163.172.72.249
                                                        Jan 15, 2025 02:53:10.438575983 CET50043445192.168.2.8163.172.72.249
                                                        Jan 15, 2025 02:53:10.438826084 CET50044445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.445687056 CET44550044163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.445750952 CET50044445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.445768118 CET50044445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.445833921 CET44550043163.172.72.249192.168.2.8
                                                        Jan 15, 2025 02:53:10.445910931 CET50043445192.168.2.8163.172.72.249
                                                        Jan 15, 2025 02:53:10.446130991 CET50045445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.452862024 CET44550045163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.453046083 CET44550044163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:10.453072071 CET50045445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.453095913 CET50044445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.453150988 CET50045445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:10.460072994 CET44550045163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:11.290785074 CET50046445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:11.295753002 CET44550046155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:11.295881033 CET50046445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:11.295913935 CET50046445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:11.300692081 CET44550046155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:11.962451935 CET50047445192.168.2.8181.250.17.254
                                                        Jan 15, 2025 02:53:11.967366934 CET44550047181.250.17.254192.168.2.8
                                                        Jan 15, 2025 02:53:11.967466116 CET50047445192.168.2.8181.250.17.254
                                                        Jan 15, 2025 02:53:11.967536926 CET50047445192.168.2.8181.250.17.254
                                                        Jan 15, 2025 02:53:11.967828035 CET50048445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.972385883 CET44550047181.250.17.254192.168.2.8
                                                        Jan 15, 2025 02:53:11.972451925 CET50047445192.168.2.8181.250.17.254
                                                        Jan 15, 2025 02:53:11.972593069 CET44550048181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:11.972680092 CET50048445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.972681046 CET50048445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.972995996 CET50049445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.977612019 CET44550048181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:11.977660894 CET50048445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.977868080 CET44550049181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:11.977919102 CET50049445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.977962971 CET50049445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:11.982687950 CET44550049181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:12.080837011 CET44550045163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:12.080952883 CET50045445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:12.080996990 CET50045445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:12.081037998 CET50045445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:12.085743904 CET44550045163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:12.085855961 CET44550045163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:12.296045065 CET445499581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:53:12.296147108 CET49958445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:12.296180964 CET49958445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:12.296233892 CET49958445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:12.301026106 CET445499581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:53:12.301040888 CET445499581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:53:13.305823088 CET50050445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:13.310592890 CET4455005055.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:53:13.310664892 CET50050445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:13.310723066 CET50050445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:13.315422058 CET4455005055.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:53:13.384494066 CET50051445192.168.2.844.41.62.34
                                                        Jan 15, 2025 02:53:13.390153885 CET4455005144.41.62.34192.168.2.8
                                                        Jan 15, 2025 02:53:13.390292883 CET50051445192.168.2.844.41.62.34
                                                        Jan 15, 2025 02:53:13.390328884 CET50051445192.168.2.844.41.62.34
                                                        Jan 15, 2025 02:53:13.390568972 CET50052445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.396348000 CET4455005244.41.62.1192.168.2.8
                                                        Jan 15, 2025 02:53:13.396433115 CET50052445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.396477938 CET50052445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.396720886 CET50053445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.397180080 CET4455005144.41.62.34192.168.2.8
                                                        Jan 15, 2025 02:53:13.397244930 CET50051445192.168.2.844.41.62.34
                                                        Jan 15, 2025 02:53:13.402391911 CET4455005344.41.62.1192.168.2.8
                                                        Jan 15, 2025 02:53:13.402571917 CET50053445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.402605057 CET4455005244.41.62.1192.168.2.8
                                                        Jan 15, 2025 02:53:13.402643919 CET50053445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.402657032 CET50052445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:13.407366037 CET4455005344.41.62.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.345252037 CET44549983106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.345314980 CET49983445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:14.345382929 CET49983445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:14.345419884 CET49983445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:14.350151062 CET44549983106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.350162029 CET44549983106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.712447882 CET50054445192.168.2.85.78.105.227
                                                        Jan 15, 2025 02:53:14.717197895 CET445500545.78.105.227192.168.2.8
                                                        Jan 15, 2025 02:53:14.717286110 CET50054445192.168.2.85.78.105.227
                                                        Jan 15, 2025 02:53:14.717328072 CET50054445192.168.2.85.78.105.227
                                                        Jan 15, 2025 02:53:14.717482090 CET50055445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.722263098 CET445500545.78.105.227192.168.2.8
                                                        Jan 15, 2025 02:53:14.722273111 CET445500555.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.722320080 CET50054445192.168.2.85.78.105.227
                                                        Jan 15, 2025 02:53:14.722371101 CET50055445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.722424030 CET50055445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.722652912 CET50056445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.727389097 CET445500555.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.727438927 CET50055445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.727468967 CET445500565.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:14.727519989 CET50056445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.727668047 CET50056445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:14.732433081 CET445500565.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.087174892 CET50057445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:15.095607996 CET44550057163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.095699072 CET50057445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:15.095760107 CET50057445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:15.104624987 CET44550057163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.306051016 CET50058445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:15.310988903 CET445500581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.311091900 CET50058445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:15.311131001 CET50058445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:15.315970898 CET445500581.32.83.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.946911097 CET50059445192.168.2.881.205.124.50
                                                        Jan 15, 2025 02:53:15.951742887 CET4455005981.205.124.50192.168.2.8
                                                        Jan 15, 2025 02:53:15.952281952 CET50059445192.168.2.881.205.124.50
                                                        Jan 15, 2025 02:53:15.952370882 CET50059445192.168.2.881.205.124.50
                                                        Jan 15, 2025 02:53:15.952549934 CET50060445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.957258940 CET4455005981.205.124.50192.168.2.8
                                                        Jan 15, 2025 02:53:15.957329035 CET4455006081.205.124.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.957340956 CET50059445192.168.2.881.205.124.50
                                                        Jan 15, 2025 02:53:15.957392931 CET50060445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.957453012 CET50060445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.957818031 CET50061445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.962295055 CET4455006081.205.124.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.962409973 CET50060445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.962662935 CET4455006181.205.124.1192.168.2.8
                                                        Jan 15, 2025 02:53:15.962764025 CET50061445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.962801933 CET50061445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:15.967607975 CET4455006181.205.124.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.317771912 CET445500565.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.317920923 CET50056445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:16.317959070 CET50056445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:16.317959070 CET50056445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:16.322814941 CET445500565.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.322824955 CET445500565.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.341109991 CET4455000754.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.341347933 CET50007445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:16.341347933 CET50007445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:16.341347933 CET50007445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:16.346195936 CET4455000754.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.346205950 CET4455000754.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.514867067 CET4455001028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.515062094 CET50010445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:53:16.515062094 CET50010445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:53:16.515098095 CET50010445192.168.2.828.124.93.1
                                                        Jan 15, 2025 02:53:16.519896030 CET4455001028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.519958019 CET4455001028.124.93.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.572844982 CET50062445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.577761889 CET4455006228.124.93.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.577864885 CET50062445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.577936888 CET50062445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.578202009 CET50063445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.582870960 CET4455006228.124.93.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.582973957 CET50062445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.583012104 CET4455006328.124.93.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.583070993 CET50063445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.583101988 CET50063445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:16.587831974 CET4455006328.124.93.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.758315086 CET44550057163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.758424997 CET50057445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:16.770946026 CET50057445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:16.770946026 CET50057445192.168.2.8163.172.72.1
                                                        Jan 15, 2025 02:53:16.775823116 CET44550057163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.775854111 CET44550057163.172.72.1192.168.2.8
                                                        Jan 15, 2025 02:53:16.825212955 CET50064445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.830059052 CET44550064163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.830147982 CET50064445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.830238104 CET50064445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.830533028 CET50065445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.835150957 CET44550064163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.835201979 CET50064445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.835422993 CET44550065163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:16.835484028 CET50065445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.835537910 CET50065445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:16.840316057 CET44550065163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:17.103184938 CET50066445192.168.2.8143.214.82.76
                                                        Jan 15, 2025 02:53:17.108025074 CET44550066143.214.82.76192.168.2.8
                                                        Jan 15, 2025 02:53:17.108194113 CET50066445192.168.2.8143.214.82.76
                                                        Jan 15, 2025 02:53:17.108282089 CET50066445192.168.2.8143.214.82.76
                                                        Jan 15, 2025 02:53:17.108407021 CET50067445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.113303900 CET44550066143.214.82.76192.168.2.8
                                                        Jan 15, 2025 02:53:17.113368034 CET50066445192.168.2.8143.214.82.76
                                                        Jan 15, 2025 02:53:17.113904953 CET44550067143.214.82.1192.168.2.8
                                                        Jan 15, 2025 02:53:17.114017963 CET50067445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.114017963 CET50067445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.114238024 CET50068445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.119007111 CET44550067143.214.82.1192.168.2.8
                                                        Jan 15, 2025 02:53:17.119040966 CET44550068143.214.82.1192.168.2.8
                                                        Jan 15, 2025 02:53:17.119067907 CET50067445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.119103909 CET50068445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.119153976 CET50068445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:17.125113010 CET44550068143.214.82.1192.168.2.8
                                                        Jan 15, 2025 02:53:17.352677107 CET50069445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:17.357645035 CET44550069106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:53:17.357743025 CET50069445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:17.357743979 CET50069445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:17.362684011 CET44550069106.127.87.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.181261063 CET50070445192.168.2.895.55.13.208
                                                        Jan 15, 2025 02:53:18.186070919 CET4455007095.55.13.208192.168.2.8
                                                        Jan 15, 2025 02:53:18.188146114 CET50070445192.168.2.895.55.13.208
                                                        Jan 15, 2025 02:53:18.188275099 CET50070445192.168.2.895.55.13.208
                                                        Jan 15, 2025 02:53:18.188458920 CET50071445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.193227053 CET4455007095.55.13.208192.168.2.8
                                                        Jan 15, 2025 02:53:18.193341970 CET4455007195.55.13.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.193399906 CET50070445192.168.2.895.55.13.208
                                                        Jan 15, 2025 02:53:18.193434000 CET50071445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.193484068 CET50071445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.193746090 CET50072445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.198381901 CET4455007195.55.13.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.198542118 CET4455007295.55.13.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.198590040 CET50071445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.198626995 CET50072445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.198657036 CET50072445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:18.203463078 CET4455007295.55.13.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.372453928 CET44550017215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.374098063 CET50017445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:18.374098063 CET50017445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:18.374098063 CET50017445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:18.379096031 CET44550017215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.379132986 CET44550017215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:53:18.458204031 CET44550065163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:18.460757971 CET50065445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:18.460813999 CET50065445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:18.460813999 CET50065445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:18.465909958 CET44550065163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:18.466012955 CET44550065163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:19.196804047 CET50073445192.168.2.8169.138.150.160
                                                        Jan 15, 2025 02:53:19.200553894 CET44550041152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:19.200701952 CET50041445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:19.200701952 CET50041445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:19.200740099 CET50041445192.168.2.8152.30.194.2
                                                        Jan 15, 2025 02:53:19.201687098 CET44550073169.138.150.160192.168.2.8
                                                        Jan 15, 2025 02:53:19.201761007 CET50073445192.168.2.8169.138.150.160
                                                        Jan 15, 2025 02:53:19.201836109 CET50073445192.168.2.8169.138.150.160
                                                        Jan 15, 2025 02:53:19.202047110 CET50074445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.205596924 CET44550041152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:19.205626011 CET44550041152.30.194.2192.168.2.8
                                                        Jan 15, 2025 02:53:19.206757069 CET44550073169.138.150.160192.168.2.8
                                                        Jan 15, 2025 02:53:19.206814051 CET50073445192.168.2.8169.138.150.160
                                                        Jan 15, 2025 02:53:19.206948996 CET44550074169.138.150.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.207019091 CET50074445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.207087040 CET50074445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.207341909 CET50075445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.212107897 CET44550074169.138.150.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.212191105 CET50074445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.212194920 CET44550075169.138.150.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.212258101 CET50075445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.212292910 CET50075445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:19.217089891 CET44550075169.138.150.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.259023905 CET50076445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.263926029 CET44550076152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:19.263992071 CET50076445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.264034986 CET50076445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.264380932 CET50077445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.269002914 CET44550076152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:19.269053936 CET50076445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.269141912 CET44550077152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:19.269211054 CET50077445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.269211054 CET50077445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:19.274015903 CET44550077152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:19.321573019 CET50078445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:19.326519012 CET445500785.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.326632977 CET50078445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:19.326745033 CET50078445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:19.331505060 CET445500785.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.353282928 CET50079445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:19.358118057 CET4455007954.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:53:19.358186960 CET50079445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:19.358222008 CET50079445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:19.362962961 CET4455007954.57.185.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.134315968 CET50080445192.168.2.830.210.98.71
                                                        Jan 15, 2025 02:53:20.139219046 CET4455008030.210.98.71192.168.2.8
                                                        Jan 15, 2025 02:53:20.139355898 CET50080445192.168.2.830.210.98.71
                                                        Jan 15, 2025 02:53:20.139519930 CET50080445192.168.2.830.210.98.71
                                                        Jan 15, 2025 02:53:20.139780045 CET50081445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.144435883 CET4455008030.210.98.71192.168.2.8
                                                        Jan 15, 2025 02:53:20.144490004 CET50080445192.168.2.830.210.98.71
                                                        Jan 15, 2025 02:53:20.144597054 CET4455008130.210.98.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.144649029 CET50081445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.144690037 CET50081445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.145169973 CET50082445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.149640083 CET4455008130.210.98.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.149691105 CET50081445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.150068045 CET4455008230.210.98.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.150140047 CET50082445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.150260925 CET50082445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:20.154987097 CET4455008230.210.98.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.372518063 CET44550020163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.372603893 CET50020445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:20.372627974 CET50020445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:20.372667074 CET50020445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:20.377630949 CET44550020163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.377645969 CET44550020163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.924200058 CET445500785.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.924323082 CET50078445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:20.924323082 CET50078445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:20.924453020 CET50078445192.168.2.85.78.105.1
                                                        Jan 15, 2025 02:53:20.929202080 CET445500785.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.929286957 CET445500785.78.105.1192.168.2.8
                                                        Jan 15, 2025 02:53:20.977812052 CET50083445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.982673883 CET445500835.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:20.982841969 CET50083445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.982928038 CET50083445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.983295918 CET50084445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.987773895 CET445500835.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:20.987863064 CET50083445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.988152027 CET445500845.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:20.988213062 CET50084445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.988233089 CET50084445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:20.993108988 CET445500845.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.009268999 CET50085445192.168.2.8214.117.94.222
                                                        Jan 15, 2025 02:53:21.014189005 CET44550085214.117.94.222192.168.2.8
                                                        Jan 15, 2025 02:53:21.014280081 CET50085445192.168.2.8214.117.94.222
                                                        Jan 15, 2025 02:53:21.014329910 CET50085445192.168.2.8214.117.94.222
                                                        Jan 15, 2025 02:53:21.014518976 CET50086445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.019268036 CET44550085214.117.94.222192.168.2.8
                                                        Jan 15, 2025 02:53:21.019339085 CET44550086214.117.94.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.019347906 CET50085445192.168.2.8214.117.94.222
                                                        Jan 15, 2025 02:53:21.019404888 CET50086445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.019440889 CET50086445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.019686937 CET50087445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.024359941 CET44550086214.117.94.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.024389029 CET44550086214.117.94.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.024436951 CET50086445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.024588108 CET44550087214.117.94.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.024698019 CET50087445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.029150963 CET50087445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:21.034080029 CET44550087214.117.94.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.233450890 CET44550021101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.233547926 CET50021445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:53:21.233609915 CET50021445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:53:21.233669996 CET50021445192.168.2.8101.229.22.1
                                                        Jan 15, 2025 02:53:21.238404989 CET44550021101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.238416910 CET44550021101.229.22.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.290566921 CET50088445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.297066927 CET44550088101.229.22.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.301928043 CET50088445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.301973104 CET50088445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.302270889 CET50089445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.308660030 CET44550088101.229.22.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.308830023 CET44550089101.229.22.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.308933973 CET50089445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.308983088 CET50089445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.309081078 CET50088445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:21.315509081 CET44550089101.229.22.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.383980989 CET50090445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:21.388951063 CET44550090215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.389019012 CET50090445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:21.389043093 CET50090445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:21.393938065 CET44550090215.188.3.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.462182045 CET50091445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:21.467674017 CET44550091163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.467751980 CET50091445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:21.467777014 CET50091445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:21.472821951 CET44550091163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:21.837518930 CET50093445192.168.2.8165.71.85.103
                                                        Jan 15, 2025 02:53:21.842566013 CET44550093165.71.85.103192.168.2.8
                                                        Jan 15, 2025 02:53:21.844710112 CET50093445192.168.2.8165.71.85.103
                                                        Jan 15, 2025 02:53:21.844753027 CET50093445192.168.2.8165.71.85.103
                                                        Jan 15, 2025 02:53:21.844873905 CET50094445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.849699020 CET44550094165.71.85.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.849833012 CET44550093165.71.85.103192.168.2.8
                                                        Jan 15, 2025 02:53:21.850052118 CET50093445192.168.2.8165.71.85.103
                                                        Jan 15, 2025 02:53:21.850063086 CET50094445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.850167990 CET50094445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.850483894 CET50095445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.855081081 CET44550094165.71.85.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.855446100 CET44550095165.71.85.1192.168.2.8
                                                        Jan 15, 2025 02:53:21.855520010 CET50094445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.855602980 CET50095445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.855602980 CET50095445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:21.860523939 CET44550095165.71.85.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.422930002 CET44550024219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.423156977 CET50024445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:22.423290968 CET50024445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:22.423362017 CET50024445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:22.428014040 CET44550024219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.428113937 CET44550024219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.586815119 CET445500845.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:22.586882114 CET50084445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:22.586930037 CET50084445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:22.586975098 CET50084445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:22.591784000 CET445500845.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:22.591814041 CET445500845.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:22.612463951 CET44550025121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.612550974 CET50025445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:53:22.616118908 CET50025445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:53:22.616178036 CET50025445192.168.2.8121.178.121.1
                                                        Jan 15, 2025 02:53:22.620974064 CET44550025121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.621004105 CET44550025121.178.121.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.628281116 CET50096445192.168.2.821.90.103.237
                                                        Jan 15, 2025 02:53:22.633151054 CET4455009621.90.103.237192.168.2.8
                                                        Jan 15, 2025 02:53:22.633225918 CET50096445192.168.2.821.90.103.237
                                                        Jan 15, 2025 02:53:22.636477947 CET50096445192.168.2.821.90.103.237
                                                        Jan 15, 2025 02:53:22.636610985 CET50097445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.641371012 CET4455009621.90.103.237192.168.2.8
                                                        Jan 15, 2025 02:53:22.641433954 CET50096445192.168.2.821.90.103.237
                                                        Jan 15, 2025 02:53:22.641462088 CET4455009721.90.103.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.641520023 CET50097445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.645258904 CET50097445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.645622015 CET50098445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.650089025 CET4455009721.90.103.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.650134087 CET50097445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.650418043 CET4455009821.90.103.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.650475979 CET50098445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.653686047 CET50098445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:22.658615112 CET4455009821.90.103.1192.168.2.8
                                                        Jan 15, 2025 02:53:22.706727982 CET50099445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.711693048 CET44550099121.178.121.2192.168.2.8
                                                        Jan 15, 2025 02:53:22.711755991 CET50099445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.715064049 CET50099445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.715919971 CET50100445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.719968081 CET44550099121.178.121.2192.168.2.8
                                                        Jan 15, 2025 02:53:22.720022917 CET50099445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.720854044 CET44550100121.178.121.2192.168.2.8
                                                        Jan 15, 2025 02:53:22.720909119 CET50100445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.721076965 CET50100445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:22.725893974 CET44550100121.178.121.2192.168.2.8
                                                        Jan 15, 2025 02:53:23.136194944 CET44550091163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:23.136274099 CET50091445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:23.136301994 CET50091445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:23.136337996 CET50091445192.168.2.8163.172.72.2
                                                        Jan 15, 2025 02:53:23.141787052 CET44550091163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:23.141801119 CET44550091163.172.72.2192.168.2.8
                                                        Jan 15, 2025 02:53:23.196454048 CET50101445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.201245070 CET44550101163.172.72.3192.168.2.8
                                                        Jan 15, 2025 02:53:23.201318026 CET50101445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.201340914 CET50101445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.201669931 CET50102445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.207119942 CET44550101163.172.72.3192.168.2.8
                                                        Jan 15, 2025 02:53:23.207170010 CET50101445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.207297087 CET44550102163.172.72.3192.168.2.8
                                                        Jan 15, 2025 02:53:23.207357883 CET50102445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.207380056 CET50102445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:23.212869883 CET44550102163.172.72.3192.168.2.8
                                                        Jan 15, 2025 02:53:23.384020090 CET50104445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:23.389125109 CET44550104163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:53:23.389225006 CET50104445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:23.389271975 CET50104445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:23.394124985 CET44550104163.125.116.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.388174057 CET4455002847.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.388281107 CET50028445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:24.388334036 CET50028445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:24.388386011 CET50028445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:24.393199921 CET4455002847.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.393244028 CET4455002847.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.673163891 CET4455002922.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.673367977 CET50029445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:24.673367977 CET50029445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:24.673398972 CET50029445192.168.2.822.150.89.1
                                                        Jan 15, 2025 02:53:24.679095030 CET4455002922.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.679111004 CET4455002922.150.89.1192.168.2.8
                                                        Jan 15, 2025 02:53:24.727814913 CET50108445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.733685970 CET4455010822.150.89.2192.168.2.8
                                                        Jan 15, 2025 02:53:24.733771086 CET50108445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.733836889 CET50108445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.734128952 CET50109445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.739368916 CET4455010922.150.89.2192.168.2.8
                                                        Jan 15, 2025 02:53:24.739387035 CET4455010822.150.89.2192.168.2.8
                                                        Jan 15, 2025 02:53:24.739437103 CET50109445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.739464045 CET50108445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.739465952 CET50109445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:24.745361090 CET4455010922.150.89.2192.168.2.8
                                                        Jan 15, 2025 02:53:25.435275078 CET50112445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:25.440073967 CET44550112219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:25.440140009 CET50112445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:25.440167904 CET50112445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:25.446510077 CET44550112219.130.9.1192.168.2.8
                                                        Jan 15, 2025 02:53:25.605495930 CET50114445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:25.610291958 CET445501145.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:25.610359907 CET50114445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:25.610388994 CET50114445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:25.615156889 CET445501145.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:26.622740030 CET44550033177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:26.622863054 CET50033445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:26.622920990 CET50033445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:26.622968912 CET50033445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:26.627686977 CET44550033177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:26.627717018 CET44550033177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:26.638036013 CET44550032203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:26.638104916 CET50032445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:26.638168097 CET50032445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:26.638220072 CET50032445192.168.2.8203.207.57.1
                                                        Jan 15, 2025 02:53:26.643038988 CET44550032203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:26.643055916 CET44550032203.207.57.1192.168.2.8
                                                        Jan 15, 2025 02:53:26.696645975 CET50121445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.701642036 CET44550121203.207.57.2192.168.2.8
                                                        Jan 15, 2025 02:53:26.702088118 CET50121445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.702127934 CET50121445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.702449083 CET50122445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.707071066 CET44550121203.207.57.2192.168.2.8
                                                        Jan 15, 2025 02:53:26.707257986 CET44550122203.207.57.2192.168.2.8
                                                        Jan 15, 2025 02:53:26.707319975 CET50121445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.707339048 CET50122445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.707357883 CET50122445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:26.712151051 CET44550122203.207.57.2192.168.2.8
                                                        Jan 15, 2025 02:53:27.193053961 CET445501145.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:27.193186998 CET50114445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:27.193229914 CET50114445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:27.193265915 CET50114445192.168.2.85.78.105.2
                                                        Jan 15, 2025 02:53:27.198847055 CET445501145.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:27.198878050 CET445501145.78.105.2192.168.2.8
                                                        Jan 15, 2025 02:53:27.259099960 CET50126445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.263972044 CET445501265.78.105.3192.168.2.8
                                                        Jan 15, 2025 02:53:27.264044046 CET50126445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.264108896 CET50126445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.264560938 CET50128445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.269117117 CET445501265.78.105.3192.168.2.8
                                                        Jan 15, 2025 02:53:27.269182920 CET50126445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.269447088 CET445501285.78.105.3192.168.2.8
                                                        Jan 15, 2025 02:53:27.269505978 CET50128445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.269584894 CET50128445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:27.274390936 CET445501285.78.105.3192.168.2.8
                                                        Jan 15, 2025 02:53:27.399602890 CET50130445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:27.404551029 CET4455013047.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:27.404665947 CET50130445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:27.404685974 CET50130445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:27.409516096 CET4455013047.41.183.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.438895941 CET44550036156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.438954115 CET50036445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:28.438981056 CET50036445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:28.439018011 CET50036445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:28.443942070 CET44550036156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.443972111 CET44550036156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.591229916 CET44550037157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.591460943 CET50037445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:28.595565081 CET50037445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:28.595612049 CET50037445192.168.2.8157.182.126.1
                                                        Jan 15, 2025 02:53:28.601972103 CET44550037157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.602003098 CET44550037157.182.126.1192.168.2.8
                                                        Jan 15, 2025 02:53:28.649657011 CET50144445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.656008959 CET44550144157.182.126.2192.168.2.8
                                                        Jan 15, 2025 02:53:28.656084061 CET50144445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.656126976 CET50144445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.656461000 CET50145445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.662770033 CET44550144157.182.126.2192.168.2.8
                                                        Jan 15, 2025 02:53:28.662831068 CET50144445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.662833929 CET44550145157.182.126.2192.168.2.8
                                                        Jan 15, 2025 02:53:28.662902117 CET50145445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.662946939 CET50145445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:28.667745113 CET44550145157.182.126.2192.168.2.8
                                                        Jan 15, 2025 02:53:29.325706005 CET44550077152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:29.325875044 CET50077445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:29.325875044 CET50077445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:29.326020956 CET50077445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:29.330763102 CET44550077152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:29.330872059 CET44550077152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:29.634200096 CET50158445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:29.639105082 CET44550158177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:29.639235973 CET50158445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:29.643798113 CET50158445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:29.648617983 CET44550158177.124.25.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.189086914 CET44550040107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.189188004 CET50040445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:30.189232111 CET50040445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:30.189232111 CET50040445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:30.194099903 CET44550040107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.194113970 CET44550040107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.622569084 CET44550042107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.622783899 CET50042445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:30.622783899 CET50042445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:30.622783899 CET50042445192.168.2.8107.227.162.1
                                                        Jan 15, 2025 02:53:30.627650023 CET44550042107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.627665043 CET44550042107.227.162.1192.168.2.8
                                                        Jan 15, 2025 02:53:30.680969000 CET50177445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.685874939 CET44550177107.227.162.2192.168.2.8
                                                        Jan 15, 2025 02:53:30.686016083 CET50177445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.686016083 CET50177445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.686301947 CET50178445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.690982103 CET44550177107.227.162.2192.168.2.8
                                                        Jan 15, 2025 02:53:30.691124916 CET50177445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.691179037 CET44550178107.227.162.2192.168.2.8
                                                        Jan 15, 2025 02:53:30.691342115 CET50178445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.691378117 CET50178445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:30.696209908 CET44550178107.227.162.2192.168.2.8
                                                        Jan 15, 2025 02:53:31.446382999 CET50197445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:31.452830076 CET44550197156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:31.453042984 CET50197445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:31.453109026 CET50197445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:31.458008051 CET44550197156.145.218.1192.168.2.8
                                                        Jan 15, 2025 02:53:32.337369919 CET50221445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:32.342247963 CET44550221152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:32.342338085 CET50221445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:32.342379093 CET50221445192.168.2.8152.30.194.3
                                                        Jan 15, 2025 02:53:32.347140074 CET44550221152.30.194.3192.168.2.8
                                                        Jan 15, 2025 02:53:32.690701962 CET44550046155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:32.690952063 CET50046445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:32.690952063 CET50046445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:32.690953016 CET50046445192.168.2.8155.74.15.1
                                                        Jan 15, 2025 02:53:32.695935965 CET44550046155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:32.695945024 CET44550046155.74.15.1192.168.2.8
                                                        Jan 15, 2025 02:53:32.743612051 CET50236445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.748523951 CET44550236155.74.15.2192.168.2.8
                                                        Jan 15, 2025 02:53:32.748641968 CET50236445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.748760939 CET50236445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.749106884 CET50237445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.753644943 CET44550236155.74.15.2192.168.2.8
                                                        Jan 15, 2025 02:53:32.753706932 CET50236445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.753951073 CET44550237155.74.15.2192.168.2.8
                                                        Jan 15, 2025 02:53:32.754034996 CET50237445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.754075050 CET50237445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:32.758794069 CET44550237155.74.15.2192.168.2.8
                                                        Jan 15, 2025 02:53:33.196544886 CET50259445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:33.201481104 CET44550259107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:33.201611996 CET50259445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:33.201647043 CET50259445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:33.206388950 CET44550259107.39.6.1192.168.2.8
                                                        Jan 15, 2025 02:53:33.392406940 CET44550049181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:33.392565966 CET50049445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:33.392566919 CET50049445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:33.392672062 CET50049445192.168.2.8181.250.17.1
                                                        Jan 15, 2025 02:53:33.397471905 CET44550049181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:33.397480965 CET44550049181.250.17.1192.168.2.8
                                                        Jan 15, 2025 02:53:34.669666052 CET4455005055.167.153.1192.168.2.8
                                                        Jan 15, 2025 02:53:34.669735909 CET50050445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:34.778867006 CET4455005344.41.62.1192.168.2.8
                                                        Jan 15, 2025 02:53:34.778958082 CET50053445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:35.994887114 CET50050445192.168.2.855.167.153.1
                                                        Jan 15, 2025 02:53:35.994978905 CET50089445192.168.2.8101.229.22.2
                                                        Jan 15, 2025 02:53:35.995037079 CET50075445192.168.2.8169.138.150.1
                                                        Jan 15, 2025 02:53:35.995069981 CET50109445192.168.2.822.150.89.2
                                                        Jan 15, 2025 02:53:35.995094061 CET50145445192.168.2.8157.182.126.2
                                                        Jan 15, 2025 02:53:35.995107889 CET50130445192.168.2.847.41.183.1
                                                        Jan 15, 2025 02:53:35.995148897 CET50178445192.168.2.8107.227.162.2
                                                        Jan 15, 2025 02:53:35.995217085 CET50053445192.168.2.844.41.62.1
                                                        Jan 15, 2025 02:53:35.995239019 CET50058445192.168.2.81.32.83.1
                                                        Jan 15, 2025 02:53:35.995264053 CET50122445192.168.2.8203.207.57.2
                                                        Jan 15, 2025 02:53:35.995264053 CET50061445192.168.2.881.205.124.1
                                                        Jan 15, 2025 02:53:35.995302916 CET50063445192.168.2.828.124.93.2
                                                        Jan 15, 2025 02:53:35.995306015 CET50068445192.168.2.8143.214.82.1
                                                        Jan 15, 2025 02:53:35.995331049 CET50102445192.168.2.8163.172.72.3
                                                        Jan 15, 2025 02:53:35.995347977 CET50069445192.168.2.8106.127.87.1
                                                        Jan 15, 2025 02:53:35.995368004 CET50072445192.168.2.895.55.13.1
                                                        Jan 15, 2025 02:53:35.995439053 CET50098445192.168.2.821.90.103.1
                                                        Jan 15, 2025 02:53:35.995491028 CET50082445192.168.2.830.210.98.1
                                                        Jan 15, 2025 02:53:35.995492935 CET50079445192.168.2.854.57.185.1
                                                        Jan 15, 2025 02:53:35.995546103 CET50090445192.168.2.8215.188.3.1
                                                        Jan 15, 2025 02:53:35.995548010 CET50087445192.168.2.8214.117.94.1
                                                        Jan 15, 2025 02:53:35.995573997 CET50095445192.168.2.8165.71.85.1
                                                        Jan 15, 2025 02:53:35.995584011 CET50100445192.168.2.8121.178.121.2
                                                        Jan 15, 2025 02:53:35.995631933 CET50112445192.168.2.8219.130.9.1
                                                        Jan 15, 2025 02:53:35.995647907 CET50104445192.168.2.8163.125.116.1
                                                        Jan 15, 2025 02:53:35.995647907 CET50197445192.168.2.8156.145.218.1
                                                        Jan 15, 2025 02:53:35.995701075 CET50237445192.168.2.8155.74.15.2
                                                        Jan 15, 2025 02:53:35.995714903 CET50158445192.168.2.8177.124.25.1
                                                        Jan 15, 2025 02:53:35.995724916 CET50128445192.168.2.85.78.105.3
                                                        Jan 15, 2025 02:53:35.995748043 CET50259445192.168.2.8107.39.6.1
                                                        Jan 15, 2025 02:53:35.995789051 CET50221445192.168.2.8152.30.194.3
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 15, 2025 02:52:28.759321928 CET5724653192.168.2.81.1.1.1
                                                        Jan 15, 2025 02:52:28.768349886 CET53572461.1.1.1192.168.2.8
                                                        Jan 15, 2025 02:53:03.390356064 CET138138192.168.2.8192.168.2.255
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jan 15, 2025 02:52:28.759321928 CET192.168.2.81.1.1.10x3923Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jan 15, 2025 02:52:28.768349886 CET1.1.1.1192.168.2.80x3923No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                                        Jan 15, 2025 02:52:28.768349886 CET1.1.1.1192.168.2.80x3923No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                                        Jan 15, 2025 02:52:43.640604973 CET1.1.1.1192.168.2.80x287aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                        Jan 15, 2025 02:52:43.640604973 CET1.1.1.1192.168.2.80x287aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.849706104.16.167.22880792C:\Windows\mssecsvc.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 15, 2025 02:52:28.778832912 CET100OUTGET / HTTP/1.1
                                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                        Cache-Control: no-cache
                                                        Jan 15, 2025 02:52:29.281239986 CET778INHTTP/1.1 200 OK
                                                        Date: Wed, 15 Jan 2025 01:52:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 607
                                                        Connection: close
                                                        Server: cloudflare
                                                        CF-RAY: 90223a068edf8c99-EWR
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.849707104.16.167.228802160C:\Windows\mssecsvc.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 15, 2025 02:52:30.018604040 CET100OUTGET / HTTP/1.1
                                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                        Cache-Control: no-cache
                                                        Jan 15, 2025 02:52:30.686815023 CET778INHTTP/1.1 200 OK
                                                        Date: Wed, 15 Jan 2025 01:52:30 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 607
                                                        Connection: close
                                                        Server: cloudflare
                                                        CF-RAY: 90223a0e4a055e65-EWR
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.849719104.16.167.228803904C:\Windows\mssecsvc.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 15, 2025 02:52:31.204535007 CET100OUTGET / HTTP/1.1
                                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                        Cache-Control: no-cache
                                                        Jan 15, 2025 02:52:31.685693979 CET778INHTTP/1.1 200 OK
                                                        Date: Wed, 15 Jan 2025 01:52:31 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 607
                                                        Connection: close
                                                        Server: cloudflare
                                                        CF-RAY: 90223a15992bde9b-EWR
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:20:52:27
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\System32\loaddll32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll"
                                                        Imagebase:0x930000
                                                        File size:126'464 bytes
                                                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:20:52:27
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6ee680000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:20:52:27
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1
                                                        Imagebase:0xa40000
                                                        File size:236'544 bytes
                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:20:52:27
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:rundll32.exe C:\Users\user\Desktop\tTbeoLWNhb.dll,PlayGame
                                                        Imagebase:0x170000
                                                        File size:61'440 bytes
                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:20:52:27
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",#1
                                                        Imagebase:0x170000
                                                        File size:61'440 bytes
                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:20:52:27
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\mssecsvc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                                        Imagebase:0x400000
                                                        File size:3'723'264 bytes
                                                        MD5 hash:9BCD08D46432B6DAC27417B0DE3DA8B1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1510211339.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1510351488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1510351488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 93%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:20:52:28
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\mssecsvc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                                        Imagebase:0x400000
                                                        File size:3'723'264 bytes
                                                        MD5 hash:9BCD08D46432B6DAC27417B0DE3DA8B1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2174815751.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2174815751.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1525566306.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1525566306.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2175529883.000000000229D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2175529883.000000000229D000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1525328575.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:20:52:30
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\tTbeoLWNhb.dll",PlayGame
                                                        Imagebase:0x170000
                                                        File size:61'440 bytes
                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:20:52:30
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\tasksche.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                                        Imagebase:0x400000
                                                        File size:3'514'368 bytes
                                                        MD5 hash:82246A37BC2B94A29240A8B49DE5CF57
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1537482998.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 100%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:20:52:30
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\mssecsvc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                                        Imagebase:0x400000
                                                        File size:3'723'264 bytes
                                                        MD5 hash:9BCD08D46432B6DAC27417B0DE3DA8B1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1537853597.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1538073196.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1538073196.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1549881056.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1550066057.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1550066057.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:20:52:31
                                                        Start date:14/01/2025
                                                        Path:C:\Windows\tasksche.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                                        Imagebase:0x400000
                                                        File size:3'514'368 bytes
                                                        MD5 hash:82246A37BC2B94A29240A8B49DE5CF57
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1548367393.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1547215244.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                        Reputation:low
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:71.7%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:63.2%
                                                          Total number of Nodes:38
                                                          Total number of Limit Nodes:9
                                                          execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                                          Callgraph

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                          • sprintf.MSVCRT ref: 00407E01
                                                          • sprintf.MSVCRT ref: 00407E18
                                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                          • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                          • CreateProcessA.KERNELBASE ref: 00407EE8
                                                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.1540425940.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000006.00000002.1540399990.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540468667.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540545583.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                          • API String ID: 4281112323-1507730452
                                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.1540425940.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000006.00000002.1540399990.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540468667.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540545583.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                          • String ID:
                                                          • API String ID: 801014965-0
                                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                          Control-flow Graph

                                                          APIs
                                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                          Strings
                                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.1540425940.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000006.00000002.1540399990.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540468667.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540545583.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                          • API String ID: 774561529-2942426231
                                                          • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                          • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                          • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                          • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                          Control-flow Graph

                                                          APIs
                                                          • sprintf.MSVCRT ref: 00407C56
                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.1540425940.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000006.00000002.1540399990.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540468667.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540545583.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                          • API String ID: 3340711343-4063779371
                                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                          • __p___argc.MSVCRT ref: 004080A5
                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.1540425940.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000006.00000002.1540399990.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540468667.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540488496.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540545583.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000006.00000002.1540682142.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                          • String ID: mssecsvc2.0
                                                          • API String ID: 4274534310-3729025388
                                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                          Execution Graph

                                                          Execution Coverage:34.8%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:36
                                                          Total number of Limit Nodes:2

                                                          Callgraph

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                          • __p___argc.MSVCRT ref: 004080A5
                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.2173112009.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.2173090328.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173133845.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173229853.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173251184.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                          • String ID: mssecsvc2.0
                                                          • API String ID: 4274534310-3729025388
                                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                          Control-flow Graph

                                                          APIs
                                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                          Strings
                                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.2173112009.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.2173090328.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173133845.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173229853.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173251184.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                          • API String ID: 774561529-2942426231
                                                          • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                          • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                          • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                          • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                          Control-flow Graph

                                                          APIs
                                                          • sprintf.MSVCRT ref: 00407C56
                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.2173112009.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.2173090328.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173133845.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173229853.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173251184.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                          • API String ID: 3340711343-4063779371
                                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                          • sprintf.MSVCRT ref: 00407E01
                                                          • sprintf.MSVCRT ref: 00407E18
                                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.2173112009.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.2173090328.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173133845.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173229853.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173251184.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                          • API String ID: 4072214828-1507730452
                                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.2173112009.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.2173090328.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173133845.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173154900.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173205458.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173229853.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173251184.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A16000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A1F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A24000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A38000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          • Associated: 00000008.00000002.2173372935.0000000000A69000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                          • String ID:
                                                          • API String ID: 801014965-0
                                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                                          APIs
                                                          • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID: /../$/..\$\../$\..\
                                                          • API String ID: 3510742995-3885502717
                                                          • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                          • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                                          • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                          • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                          • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                          • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                          • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                          • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                          • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc$LibraryLoad
                                                          • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                                          • API String ID: 2238633743-2459060434
                                                          • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                          • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                                          • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                          • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                                          APIs
                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                                          • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandleOpen$ManagerStart
                                                          • String ID: cmd.exe /c "%s"
                                                          • API String ID: 1485051382-955883872
                                                          • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                          • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                                          • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                          • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                                          APIs
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                                          • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                                          • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??0exception@@ExceptionThrow$memcpy
                                                          • String ID:
                                                          • API String ID: 1881450474-3916222277
                                                          • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                          • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                                          • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                          • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                                          APIs
                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                                          • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                                          • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                                          • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                                          • String ID: WANACRY!
                                                          • API String ID: 283026544-1240840912
                                                          • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                          • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                                          • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                          • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                                          APIs
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                                          • String ID: $Q;@
                                                          • API String ID: 2382887404-262343263
                                                          • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                          • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                                          • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                          • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                                          APIs
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                                          • String ID:
                                                          • API String ID: 2382887404-3916222277
                                                          • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                          • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                                          • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                          • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                                          APIs
                                                          • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                                          • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Heap$FreeProcessfree
                                                          • String ID:
                                                          • API String ID: 3428986607-0
                                                          • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                          • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                                          • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                          • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                                          APIs
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??0exception@@ExceptionThrow
                                                          • String ID:
                                                          • API String ID: 941485209-0
                                                          • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                          • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                                          • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                          • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                                          APIs
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??0exception@@ExceptionThrow
                                                          • String ID:
                                                          • API String ID: 941485209-0
                                                          • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                          • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                                          • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                          • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID:
                                                          • API String ID: 3510742995-0
                                                          • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                          • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                                          • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                          • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                                          APIs
                                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ContextCryptRelease
                                                          • String ID:
                                                          • API String ID: 829835001-0
                                                          • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                          • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                                          • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                          • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                          • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                                          • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                          • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                          • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                                          • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                          • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                                          APIs
                                                            • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                                          • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                                          • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                                          • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                                          • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                                          • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc$LibraryLoad
                                                          • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                                          • API String ID: 2238633743-1294736154
                                                          • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                          • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                                          • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                          • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: %s%s$%s%s%s$:$\
                                                          • API String ID: 0-1100577047
                                                          • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                          • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                                          • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                          • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                                          APIs
                                                          • __p___argv.MSVCRT(0040F538), ref: 00402040
                                                          • strcmp.MSVCRT(?), ref: 0040204B
                                                          • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                                          • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                            • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                                          • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                                          • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                                          • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                                            • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                            • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                            • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                            • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                                          • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                                          • API String ID: 1074704982-2844324180
                                                          • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                          • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                                          • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                          • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                                          APIs
                                                          • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                                          • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                                          • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                                          • strlen.MSVCRT(?), ref: 004011A7
                                                          • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                                          • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                                          • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                                          • String ID: 0@$Software\$WanaCrypt0r
                                                          • API String ID: 865909632-3421300005
                                                          • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                          • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                                          • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                          • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                          • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                          • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                                          • String ID: %s\Intel$%s\ProgramData
                                                          • API String ID: 3806094219-198707228
                                                          • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                          • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                                          • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                          • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                                          APIs
                                                            • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                                          • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                                          • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                                          • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                                            • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                                          • SetLastError.KERNEL32(0000045A), ref: 00402430
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                                          • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 1900561814-3657104962
                                                          • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                          • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                                          • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                          • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                                          APIs
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                                          • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                                          • String ID: %s\%s
                                                          • API String ID: 1036847564-4073750446
                                                          • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                          • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                                          • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                          • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                                          APIs
                                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                                          • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                                          • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                                          • CloseHandle.KERNEL32(?), ref: 004010EC
                                                          • CloseHandle.KERNEL32(?), ref: 004010F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                                          • String ID: D
                                                          • API String ID: 786732093-2746444292
                                                          • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                          • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                                          • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                          • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                                          APIs
                                                          • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                                          • __p__fmode.MSVCRT ref: 004077FC
                                                          • __p__commode.MSVCRT ref: 0040780A
                                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                                          • String ID:
                                                          • API String ID: 3626615345-0
                                                          • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                          • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                                          • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                          • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                                          APIs
                                                          • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                            • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                          • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                                          • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                                          • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                                          • String ID:
                                                          • API String ID: 2141228402-0
                                                          • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                          • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                                          • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                          • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                                          APIs
                                                          • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                                          • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                                          • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Read$realloc
                                                          • String ID: ?!@
                                                          • API String ID: 1241503663-708128716
                                                          • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                          • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                                          • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                          • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: rand$wcslen$ComputerNamesrand
                                                          • String ID:
                                                          • API String ID: 3058258771-0
                                                          • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                          • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                                          • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                          • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                                          APIs
                                                          • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                                          • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                                          • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                                          • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                                          • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                                          • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                                          • String ID:
                                                          • API String ID: 2935503933-0
                                                          • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                          • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                                          • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                          • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                                          APIs
                                                          • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                                          • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                                          • Sleep.KERNEL32(000003E8), ref: 00401F40
                                                          • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseHandleMutexOpenSleepsprintf
                                                          • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                                          • API String ID: 2780352083-2959021817
                                                          • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                          • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                                          • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                          • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                                          APIs
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                                          • String ID:
                                                          • API String ID: 2382887404-0
                                                          • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                          • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                                          • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                          • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                                          APIs
                                                          • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                                          • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                                          • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                                          • fclose.MSVCRT(00000000), ref: 00401058
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: fclosefopenfreadfwrite
                                                          • String ID: c.wnry
                                                          • API String ID: 4000964834-3240288721
                                                          • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                          • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                                          • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                          • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                                          APIs
                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                                          • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                                          • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                                          • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                                          • String ID:
                                                          • API String ID: 2811923685-0
                                                          • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                          • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                                          • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                          • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                                          APIs
                                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                                          • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$Pointer$??2@Create
                                                          • String ID:
                                                          • API String ID: 1331958074-0
                                                          • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                          • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                                          • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                          • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                                          APIs
                                                          • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                                          • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast_stricmp
                                                          • String ID: P!@
                                                          • API String ID: 1278613211-1774101457
                                                          • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                          • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                                          • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                          • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                                          APIs
                                                          • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                                          • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AttributesFilestrcmp
                                                          • String ID: c.wnry
                                                          • API String ID: 3324900478-3240288721
                                                          • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                          • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                                          • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                          • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ??3@CloseHandle
                                                          • String ID: $l@
                                                          • API String ID: 3816424416-2140230165
                                                          • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                          • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                                          • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                          • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                                          • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1539139481.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000A.00000002.1539112484.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539173416.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539199298.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000706000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000070F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000714000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000728000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000749000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000A.00000002.1539225037.0000000000759000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$Entermemcpy
                                                          • String ID:
                                                          • API String ID: 3435569088-0
                                                          • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                          • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                                          • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                          • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65