Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FAuEwllF3K.dll

Overview

General Information

Sample name:FAuEwllF3K.dll
renamed because original name is a hash value
Original sample name:50b93e08b91de26b5487abe79afe1d4a.dll
Analysis ID:1591530
MD5:50b93e08b91de26b5487abe79afe1d4a
SHA1:883462757d74dfbb08b94dd66159d9852e6c2ee9
SHA256:0e665ab2b0a1d700e9cc2c94022e9fb9ed7eb9ec8210c057bf938bc62eb95467
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7304 cmdline: loaddll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7356 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7392 cmdline: rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7448 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 41B5BA4BF74E65845FA8C9861CA34508)
          • tasksche.exe (PID: 7652 cmdline: C:\WINDOWS\tasksche.exe /i MD5: C906087FBFE90924BC4F903E527E52E8)
    • rundll32.exe (PID: 7368 cmdline: rundll32.exe C:\Users\user\Desktop\FAuEwllF3K.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7708 cmdline: rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7724 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 41B5BA4BF74E65845FA8C9861CA34508)
        • tasksche.exe (PID: 7792 cmdline: C:\WINDOWS\tasksche.exe /i MD5: C906087FBFE90924BC4F903E527E52E8)
  • mssecsvc.exe (PID: 7580 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 41B5BA4BF74E65845FA8C9861CA34508)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
FAuEwllF3K.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    FAuEwllF3K.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    FAuEwllF3K.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        00000006.00000000.1339964370.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000009.00000000.1360227847.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          0000000C.00000002.1374745759.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          0000000B.00000002.1375184941.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            8.2.mssecsvc.exe.1eab084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            8.2.mssecsvc.exe.23cf8c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            11.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              11.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              11.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.886138+010020315153Misc activity104.16.167.22880192.168.2.749710TCP
              2025-01-15T03:00:08.513260+010020315153Misc activity104.16.167.22880192.168.2.749711TCP
              2025-01-15T03:00:09.943104+010020315153Misc activity104.16.167.22880192.168.2.749738TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.365139+010020242911A Network Trojan was detected192.168.2.7530661.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.884932+010020242981A Network Trojan was detected192.168.2.749710104.16.167.22880TCP
              2025-01-15T03:00:08.511806+010020242981A Network Trojan was detected192.168.2.749711104.16.167.22880TCP
              2025-01-15T03:00:09.942364+010020242981A Network Trojan was detected192.168.2.749738104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.884932+010020242991A Network Trojan was detected192.168.2.749710104.16.167.22880TCP
              2025-01-15T03:00:08.511806+010020242991A Network Trojan was detected192.168.2.749711104.16.167.22880TCP
              2025-01-15T03:00:09.942364+010020242991A Network Trojan was detected192.168.2.749738104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.884932+010020243011A Network Trojan was detected192.168.2.749710104.16.167.22880TCP
              2025-01-15T03:00:08.511806+010020243011A Network Trojan was detected192.168.2.749711104.16.167.22880TCP
              2025-01-15T03:00:09.942364+010020243011A Network Trojan was detected192.168.2.749738104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.884932+010020243021A Network Trojan was detected192.168.2.749710104.16.167.22880TCP
              2025-01-15T03:00:08.511806+010020243021A Network Trojan was detected192.168.2.749711104.16.167.22880TCP
              2025-01-15T03:00:09.942364+010020243021A Network Trojan was detected192.168.2.749738104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:07.884932+010028033043Unknown Traffic192.168.2.749710104.16.167.22880TCP
              2025-01-15T03:00:08.511806+010028033043Unknown Traffic192.168.2.749711104.16.167.22880TCP
              2025-01-15T03:00:09.942364+010028033043Unknown Traffic192.168.2.749738104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: FAuEwllF3K.dllAvira: detected
              Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 93%
              Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 97%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 93%
              Source: FAuEwllF3K.dllReversingLabs: Detection: 94%
              Source: FAuEwllF3K.dllVirustotal: Detection: 91%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
              Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: FAuEwllF3K.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: FAuEwllF3K.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49710 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49710 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49710 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49710 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49738 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49738 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49711 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49711 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49711 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49738 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49711 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49738 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:07 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90224538bf2b5e7f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:08 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022453cce3ec459-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:09 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90224545bfd8729f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.7:53066 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49710 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49738 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49710
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49711 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49711
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49738
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.62
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.62
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.62
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.62
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 21.98.72.1
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.132
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.132
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.132
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.132
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 130.135.246.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.15
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.15
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.15
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.15
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 82.67.136.1
              Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
              Source: unknownTCP traffic detected without corresponding DNS query: 29.25.90.136
              Source: unknownTCP traffic detected without corresponding DNS query: 29.25.90.136
              Source: unknownTCP traffic detected without corresponding DNS query: 29.25.90.136
              Source: unknownTCP traffic detected without corresponding DNS query: 29.25.90.1
              Source: unknownTCP traffic detected without corresponding DNS query: 29.25.90.136
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe.3.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1362002587.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/4
              Source: mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/=
              Source: mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/H
              Source: mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/J
              Source: mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/JO
              Source: mssecsvc.exe, 0000000B.00000002.1375553760.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Z
              Source: mssecsvc.exe, 00000008.00000002.1997191683.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comck
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.come
              Source: mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comgs3
              Source: mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comn
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000D16000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1375553760.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
              Source: Yara matchFile source: FAuEwllF3K.dll, type: SAMPLE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23cf8c8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23da8e8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1eba104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb60a4.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23de948.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000000.1339964370.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1375184941.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1366991636.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1353214577.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1367125832.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1353379067.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1998422277.0000000001EBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1340112507.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1998695528.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1375316014.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7448, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7580, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7724, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
              Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

              System Summary

              barindex
              Source: FAuEwllF3K.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: FAuEwllF3K.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1eab084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23cf8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23cf8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23cf8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23da8e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23da8e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1eba104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1eba104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1eb60a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1eb60a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23de948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23de948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1360227847.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000002.1374745759.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000000.1374272040.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.1367125832.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.1353379067.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.1998422277.0000000001EBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1340112507.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.1998695528.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.1375316014.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
              Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 802D815D1CD9E4193CF586124622BDE16ECB5D7127A1C0AA9A13D1E3E46F564A
              Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 802D815D1CD9E4193CF586124622BDE16ECB5D7127A1C0AA9A13D1E3E46F564A
              Source: mssecsvc.exe.3.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: FAuEwllF3K.dllBinary or memory string: OriginalFilenamelhdfrgui.exej% vs FAuEwllF3K.dll
              Source: FAuEwllF3K.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: FAuEwllF3K.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: FAuEwllF3K.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1eab084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23cf8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1edd128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.23de948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1edd128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.240196c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23cf8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23cf8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1eba104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.240196c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23da8e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23da8e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1eab084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1eba104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1eba104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1eb60a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1eb60a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23de948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23de948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1360227847.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000002.1374745759.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000000.1374272040.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.1367125832.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.1353379067.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.1998422277.0000000001EBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1340112507.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.1998695528.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.1375316014.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000009.00000000.1360227847.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.1374745759.000000000040E000.00000008.00000001.01000000.00000007.sdmp, FAuEwllF3K.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7312:120:WilError_03
              Source: FAuEwllF3K.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\FAuEwllF3K.dll,PlayGame
              Source: FAuEwllF3K.dllReversingLabs: Detection: 94%
              Source: FAuEwllF3K.dllVirustotal: Detection: 91%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\FAuEwllF3K.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\FAuEwllF3K.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: FAuEwllF3K.dllStatic file information: File size 5267459 > 1048576
              Source: FAuEwllF3K.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7624Thread sleep count: 93 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7624Thread sleep time: -186000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7628Thread sleep count: 125 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7628Thread sleep count: 48 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7624Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXY
              Source: mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000D16000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1362002587.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1997930815.0000000000C82000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1997930815.0000000000C5B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1375553760.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000006.00000002.1362002587.0000000000D16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT<
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591530 Sample: FAuEwllF3K.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 63 Tries to download HTTP data from a sinkholed server 2->63 65 Suricata IDS alerts for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 6 other signatures 2->69 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        49 192.168.2.100 unknown unknown 12->49 51 192.168.2.102 unknown unknown 12->51 53 98 other IPs or domains 12->53 79 Connects to many different private IPs via SMB (likely to spread or exploit) 12->79 81 Connects to many different private IPs (likely to spread or exploit) 12->81 signatures6 process7 file8 26 rundll32.exe 16->26         started        61 Drops executables to the windows directory (C:\Windows) and starts them 18->61 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 83 Drops executables to the windows directory (C:\Windows) and starts them 28->83 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 55 Antivirus detection for dropped file 32->55 57 Multi AV Scanner detection for dropped file 32->57 59 Machine Learning detection for dropped file 32->59 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 71 Detected Wannacry Ransomware 38->71 73 Antivirus detection for dropped file 38->73 75 Multi AV Scanner detection for dropped file 38->75 77 Machine Learning detection for dropped file 38->77

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              FAuEwllF3K.dll95%ReversingLabsWin32.Ransomware.WannaCry
              FAuEwllF3K.dll92%VirustotalBrowse
              FAuEwllF3K.dll100%AviraTR/AD.WannaCry.zbqny
              FAuEwllF3K.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\mssecsvc.exe100%AviraTR/AD.WannaCry.sewvt
              C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
              C:\Windows\mssecsvc.exe100%Joe Sandbox ML
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\mssecsvc.exe97%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.come0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comn0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comgs30%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comck0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.3.drfalse
                    high
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comnmssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Jmssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Hmssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/JOmssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.kryptoslogic.commssecsvc.exe, 00000006.00000002.1362002587.0000000000D16000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1375553760.0000000000ADC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/=mssecsvc.exe, 0000000B.00000002.1375553760.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Zmssecsvc.exe, 0000000B.00000002.1375553760.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comemssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comgs3mssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comckmssecsvc.exe, 00000008.00000002.1997930815.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/4mssecsvc.exe, 00000006.00000002.1362002587.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.1997191683.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        137.90.115.232
                                        unknownUnited States
                                        14977STATE-OF-WYOMING-ASNUSfalse
                                        137.90.115.1
                                        unknownUnited States
                                        14977STATE-OF-WYOMING-ASNUSfalse
                                        137.90.115.2
                                        unknownUnited States
                                        14977STATE-OF-WYOMING-ASNUSfalse
                                        25.91.69.1
                                        unknownUnited Kingdom
                                        7922COMCAST-7922USfalse
                                        33.182.69.1
                                        unknownUnited States
                                        2686ATGS-MMD-ASUSfalse
                                        139.72.231.1
                                        unknownUnited States
                                        10370NORTHWEST-AIRLINESUSfalse
                                        31.90.249.196
                                        unknownUnited Kingdom
                                        12576EELtdGBfalse
                                        79.119.108.2
                                        unknownRomania
                                        8708RCS-RDS73-75DrStaicoviciROfalse
                                        79.119.108.1
                                        unknownRomania
                                        8708RCS-RDS73-75DrStaicoviciROfalse
                                        139.72.231.2
                                        unknownUnited States
                                        10370NORTHWEST-AIRLINESUSfalse
                                        58.155.88.1
                                        unknownChina
                                        4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                        130.135.246.2
                                        unknownUnited States
                                        270AS270USfalse
                                        130.135.246.1
                                        unknownUnited States
                                        270AS270USfalse
                                        39.160.83.1
                                        unknownChina
                                        9808CMNET-GDGuangdongMobileCommunicationCoLtdCNfalse
                                        68.9.245.163
                                        unknownUnited States
                                        22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
                                        79.119.108.133
                                        unknownRomania
                                        8708RCS-RDS73-75DrStaicoviciROfalse
                                        137.97.46.109
                                        unknownIndia
                                        55836RELIANCEJIO-INRelianceJioInfocommLimitedINfalse
                                        39.160.83.10
                                        unknownChina
                                        9808CMNET-GDGuangdongMobileCommunicationCoLtdCNfalse
                                        91.64.225.197
                                        unknownGermany
                                        31334KABELDEUTSCHLAND-ASDEfalse
                                        IP
                                        192.168.2.148
                                        192.168.2.149
                                        192.168.2.146
                                        192.168.2.147
                                        192.168.2.140
                                        192.168.2.141
                                        192.168.2.144
                                        192.168.2.145
                                        192.168.2.142
                                        192.168.2.143
                                        192.168.2.159
                                        192.168.2.157
                                        192.168.2.158
                                        192.168.2.151
                                        192.168.2.152
                                        192.168.2.150
                                        192.168.2.155
                                        192.168.2.156
                                        192.168.2.153
                                        192.168.2.154
                                        192.168.2.126
                                        192.168.2.247
                                        192.168.2.127
                                        192.168.2.248
                                        192.168.2.124
                                        192.168.2.245
                                        192.168.2.125
                                        192.168.2.246
                                        192.168.2.128
                                        192.168.2.249
                                        192.168.2.129
                                        192.168.2.240
                                        192.168.2.122
                                        192.168.2.243
                                        192.168.2.123
                                        192.168.2.244
                                        192.168.2.120
                                        192.168.2.241
                                        192.168.2.121
                                        192.168.2.242
                                        192.168.2.97
                                        192.168.2.137
                                        192.168.2.96
                                        192.168.2.138
                                        192.168.2.99
                                        192.168.2.135
                                        192.168.2.98
                                        192.168.2.136
                                        192.168.2.139
                                        192.168.2.250
                                        192.168.2.130
                                        192.168.2.251
                                        192.168.2.91
                                        192.168.2.90
                                        192.168.2.93
                                        192.168.2.133
                                        192.168.2.254
                                        192.168.2.92
                                        192.168.2.134
                                        192.168.2.95
                                        192.168.2.131
                                        192.168.2.252
                                        192.168.2.94
                                        192.168.2.132
                                        192.168.2.253
                                        192.168.2.104
                                        192.168.2.225
                                        192.168.2.105
                                        192.168.2.226
                                        192.168.2.102
                                        192.168.2.223
                                        192.168.2.103
                                        192.168.2.224
                                        192.168.2.108
                                        192.168.2.229
                                        192.168.2.109
                                        192.168.2.106
                                        192.168.2.227
                                        192.168.2.107
                                        192.168.2.228
                                        192.168.2.100
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1591530
                                        Start date and time:2025-01-15 02:59:03 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 1s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:16
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:FAuEwllF3K.dll
                                        renamed because original name is a hash value
                                        Original Sample Name:50b93e08b91de26b5487abe79afe1d4a.dll
                                        Detection:MAL
                                        Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                        EGA Information:
                                        • Successful, ratio: 66.7%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .dll
                                        • Stop behavior analysis, all processes terminated
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                        • Excluded IPs from analysis (whitelisted): 199.232.210.172, 13.107.246.45, 20.12.23.50
                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target tasksche.exe, PID 7652 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        21:00:08API Interceptor1x Sleep call for process: loaddll32.exe modified
                                        21:00:42API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        STATE-OF-WYOMING-ASNUSarm4.elfGet hashmaliciousUnknownBrowse
                                        • 137.88.55.12
                                        spc.elfGet hashmaliciousUnknownBrowse
                                        • 137.84.122.57
                                        res.ppc.elfGet hashmaliciousUnknownBrowse
                                        • 137.87.6.41
                                        miori.sh4.elfGet hashmaliciousUnknownBrowse
                                        • 137.88.129.138
                                        armv4l.elfGet hashmaliciousUnknownBrowse
                                        • 64.207.121.31
                                        xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                        • 159.238.102.222
                                        armv7l.elfGet hashmaliciousUnknownBrowse
                                        • 159.238.162.35
                                        1.elfGet hashmaliciousUnknownBrowse
                                        • 137.84.146.209
                                        loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                        • 159.239.168.53
                                        armv7l.elfGet hashmaliciousMiraiBrowse
                                        • 137.87.139.210
                                        STATE-OF-WYOMING-ASNUSarm4.elfGet hashmaliciousUnknownBrowse
                                        • 137.88.55.12
                                        spc.elfGet hashmaliciousUnknownBrowse
                                        • 137.84.122.57
                                        res.ppc.elfGet hashmaliciousUnknownBrowse
                                        • 137.87.6.41
                                        miori.sh4.elfGet hashmaliciousUnknownBrowse
                                        • 137.88.129.138
                                        armv4l.elfGet hashmaliciousUnknownBrowse
                                        • 64.207.121.31
                                        xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                        • 159.238.102.222
                                        armv7l.elfGet hashmaliciousUnknownBrowse
                                        • 159.238.162.35
                                        1.elfGet hashmaliciousUnknownBrowse
                                        • 137.84.146.209
                                        loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                        • 159.239.168.53
                                        armv7l.elfGet hashmaliciousMiraiBrowse
                                        • 137.87.139.210
                                        STATE-OF-WYOMING-ASNUSarm4.elfGet hashmaliciousUnknownBrowse
                                        • 137.88.55.12
                                        spc.elfGet hashmaliciousUnknownBrowse
                                        • 137.84.122.57
                                        res.ppc.elfGet hashmaliciousUnknownBrowse
                                        • 137.87.6.41
                                        miori.sh4.elfGet hashmaliciousUnknownBrowse
                                        • 137.88.129.138
                                        armv4l.elfGet hashmaliciousUnknownBrowse
                                        • 64.207.121.31
                                        xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                        • 159.238.102.222
                                        armv7l.elfGet hashmaliciousUnknownBrowse
                                        • 159.238.162.35
                                        1.elfGet hashmaliciousUnknownBrowse
                                        • 137.84.146.209
                                        loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                        • 159.239.168.53
                                        armv7l.elfGet hashmaliciousMiraiBrowse
                                        • 137.87.139.210
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\WINDOWS\qeriuwjhrf (copy)1beHz2RPNUGet hashmaliciousVirut, WannacryBrowse
                                          C:\Windows\tasksche.exe1beHz2RPNUGet hashmaliciousVirut, WannacryBrowse
                                            Process:C:\Windows\mssecsvc.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):3514368
                                            Entropy (8bit):7.996073127345747
                                            Encrypted:true
                                            SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H5:QqPe1Cxcxk3ZAEUadzR8yc4H5
                                            MD5:C906087FBFE90924BC4F903E527E52E8
                                            SHA1:0CE9BD4724CAE1EDC5141E6C8074AD5FCAF9FC6A
                                            SHA-256:802D815D1CD9E4193CF586124622BDE16ECB5D7127A1C0AA9A13D1E3E46F564A
                                            SHA-512:C479F547BF5E79CFAB2985173F200583047E7F47AC565B248CCAE802D2E4633CB410A7C502D4923FA6F34D6CA9BD77F898D3EF001A1A42C8939AFF861A35457B
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 93%
                                            Joe Sandbox View:
                                            • Filename: 1beHz2RPNU, Detection: malicious, Browse
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):3723264
                                            Entropy (8bit):7.965447182412285
                                            Encrypted:false
                                            SSDEEP:98304:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HJ:yDqPe1Cxcxk3ZAEUadzR8yc4HJ
                                            MD5:41B5BA4BF74E65845FA8C9861CA34508
                                            SHA1:427934D7FA2467BAB1ABFA5959C8CF6D0AE00EA7
                                            SHA-256:95AB184ECC89B9A593C024963650F54FE0A597C3F75D75FF3BF4F33F648C6D13
                                            SHA-512:EF55010669B1098DF68C511D6863082ABCC2ED4AF78D933A1FB8DAD347893EEBC44ADE3E41B3FE296A11DD3CF026BDB0D8359DD759569DF5D7B37F9294921A48
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\mssecsvc.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):3514368
                                            Entropy (8bit):7.996073127345747
                                            Encrypted:true
                                            SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H5:QqPe1Cxcxk3ZAEUadzR8yc4H5
                                            MD5:C906087FBFE90924BC4F903E527E52E8
                                            SHA1:0CE9BD4724CAE1EDC5141E6C8074AD5FCAF9FC6A
                                            SHA-256:802D815D1CD9E4193CF586124622BDE16ECB5D7127A1C0AA9A13D1E3E46F564A
                                            SHA-512:C479F547BF5E79CFAB2985173F200583047E7F47AC565B248CCAE802D2E4633CB410A7C502D4923FA6F34D6CA9BD77F898D3EF001A1A42C8939AFF861A35457B
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 93%
                                            Joe Sandbox View:
                                            • Filename: 1beHz2RPNU, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):6.411910056306186
                                            TrID:
                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                            • DOS Executable Generic (2002/1) 0.20%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:FAuEwllF3K.dll
                                            File size:5'267'459 bytes
                                            MD5:50b93e08b91de26b5487abe79afe1d4a
                                            SHA1:883462757d74dfbb08b94dd66159d9852e6c2ee9
                                            SHA256:0e665ab2b0a1d700e9cc2c94022e9fb9ed7eb9ec8210c057bf938bc62eb95467
                                            SHA512:a5ba259031ea89c4f52669516052a821e95a64884baf047b02f8aeab0ac97258447d057c4039cea6b15ba4ee1d3f33fb4afd02d39d203ecb8b1c3ef5575ed325
                                            SSDEEP:98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPe1Cxcxk3ZAEUadzR8yc4H
                                            TLSH:4E363358652DA1BCF0440EB444A3899AB7FB3C6777FB5A1FCB8046660C43B5FABC0A51
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                            Icon Hash:7ae282899bbab082
                                            Entrypoint:0x100011e9
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x10000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                            DLL Characteristics:
                                            Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push ebx
                                            mov ebx, dword ptr [ebp+08h]
                                            push esi
                                            mov esi, dword ptr [ebp+0Ch]
                                            push edi
                                            mov edi, dword ptr [ebp+10h]
                                            test esi, esi
                                            jne 00007F21A4812EABh
                                            cmp dword ptr [10003140h], 00000000h
                                            jmp 00007F21A4812EC8h
                                            cmp esi, 01h
                                            je 00007F21A4812EA7h
                                            cmp esi, 02h
                                            jne 00007F21A4812EC4h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007F21A4812EABh
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            test eax, eax
                                            je 00007F21A4812EAEh
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007F21A4812DBAh
                                            test eax, eax
                                            jne 00007F21A4812EA6h
                                            xor eax, eax
                                            jmp 00007F21A4812EF0h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007F21A4812C6Ch
                                            cmp esi, 01h
                                            mov dword ptr [ebp+0Ch], eax
                                            jne 00007F21A4812EAEh
                                            test eax, eax
                                            jne 00007F21A4812ED9h
                                            push edi
                                            push eax
                                            push ebx
                                            call 00007F21A4812D96h
                                            test esi, esi
                                            je 00007F21A4812EA7h
                                            cmp esi, 03h
                                            jne 00007F21A4812EC8h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007F21A4812D85h
                                            test eax, eax
                                            jne 00007F21A4812EA5h
                                            and dword ptr [ebp+0Ch], eax
                                            cmp dword ptr [ebp+0Ch], 00000000h
                                            je 00007F21A4812EB3h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007F21A4812EAAh
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            mov dword ptr [ebp+0Ch], eax
                                            mov eax, dword ptr [ebp+0Ch]
                                            pop edi
                                            pop esi
                                            pop ebx
                                            pop ebp
                                            retn 000Ch
                                            jmp dword ptr [10002028h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            Programming Language:
                                            • [ C ] VS98 (6.0) build 8168
                                            • [C++] VS98 (6.0) build 8168
                                            • [RES] VS98 (6.0) cvtres build 1720
                                            • [LNK] VS98 (6.0) imp/exp build 8168
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x40000x5000600x50100097b858462edcd8e995af213887ca03ffunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            W0x40600x500000dataEnglishUnited States0.8770942687988281
                                            DLLImport
                                            KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                            MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                            NameOrdinalAddress
                                            PlayGame10x10001114
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-01-15T03:00:07.365139+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.7530661.1.1.153UDP
                                            2025-01-15T03:00:07.884932+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749710104.16.167.22880TCP
                                            2025-01-15T03:00:07.884932+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749710104.16.167.22880TCP
                                            2025-01-15T03:00:07.884932+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749710104.16.167.22880TCP
                                            2025-01-15T03:00:07.884932+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749710104.16.167.22880TCP
                                            2025-01-15T03:00:07.884932+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749710104.16.167.22880TCP
                                            2025-01-15T03:00:07.886138+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749710TCP
                                            2025-01-15T03:00:08.511806+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749711104.16.167.22880TCP
                                            2025-01-15T03:00:08.511806+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749711104.16.167.22880TCP
                                            2025-01-15T03:00:08.511806+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749711104.16.167.22880TCP
                                            2025-01-15T03:00:08.511806+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749711104.16.167.22880TCP
                                            2025-01-15T03:00:08.511806+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749711104.16.167.22880TCP
                                            2025-01-15T03:00:08.513260+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749711TCP
                                            2025-01-15T03:00:09.942364+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749738104.16.167.22880TCP
                                            2025-01-15T03:00:09.942364+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749738104.16.167.22880TCP
                                            2025-01-15T03:00:09.942364+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749738104.16.167.22880TCP
                                            2025-01-15T03:00:09.942364+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749738104.16.167.22880TCP
                                            2025-01-15T03:00:09.942364+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749738104.16.167.22880TCP
                                            2025-01-15T03:00:09.943104+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749738TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 15, 2025 03:00:00.144078016 CET49677443192.168.2.720.50.201.200
                                            Jan 15, 2025 03:00:00.659893036 CET49674443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:00.659904957 CET49675443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:00.847229004 CET49672443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:01.644119978 CET49677443192.168.2.720.50.201.200
                                            Jan 15, 2025 03:00:04.628472090 CET49677443192.168.2.720.50.201.200
                                            Jan 15, 2025 03:00:07.381766081 CET4971080192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:07.386665106 CET8049710104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:07.386748075 CET4971080192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:07.387568951 CET4971080192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:07.392375946 CET8049710104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:07.884793997 CET8049710104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:07.884932041 CET4971080192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:07.885052919 CET4971080192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:07.886137962 CET8049710104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:07.886218071 CET4971080192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:07.889806032 CET8049710104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:08.039798975 CET4971180192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:08.045358896 CET8049711104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:08.045454025 CET4971180192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:08.045598030 CET4971180192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:08.050359964 CET8049711104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:08.511749983 CET8049711104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:08.511806011 CET4971180192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:08.511908054 CET4971180192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:08.513259888 CET8049711104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:08.513309002 CET4971180192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:08.516700029 CET8049711104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:08.591212988 CET49717445192.168.2.721.98.72.62
                                            Jan 15, 2025 03:00:08.596110106 CET4454971721.98.72.62192.168.2.7
                                            Jan 15, 2025 03:00:08.596302986 CET49717445192.168.2.721.98.72.62
                                            Jan 15, 2025 03:00:08.597038031 CET49717445192.168.2.721.98.72.62
                                            Jan 15, 2025 03:00:08.598649025 CET49718445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.601878881 CET4454971721.98.72.62192.168.2.7
                                            Jan 15, 2025 03:00:08.601937056 CET49717445192.168.2.721.98.72.62
                                            Jan 15, 2025 03:00:08.603491068 CET4454971821.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:08.603558064 CET49718445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.603692055 CET49718445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.607043028 CET49719445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.608733892 CET4454971821.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:08.608784914 CET49718445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.611896992 CET4454971921.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:08.612004042 CET49719445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.612004042 CET49719445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:08.616851091 CET4454971921.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:09.425993919 CET49671443192.168.2.7204.79.197.203
                                            Jan 15, 2025 03:00:09.470228910 CET4973880192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:09.475020885 CET8049738104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:09.475100040 CET4973880192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:09.475254059 CET4973880192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:09.479958057 CET8049738104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:09.942291975 CET8049738104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:09.942363977 CET4973880192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:09.942451000 CET4973880192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:09.943104029 CET8049738104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:09.943161011 CET4973880192.168.2.7104.16.167.228
                                            Jan 15, 2025 03:00:09.947216988 CET8049738104.16.167.228192.168.2.7
                                            Jan 15, 2025 03:00:10.269093990 CET49674443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:10.269100904 CET49675443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:10.456650019 CET49672443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:10.552000046 CET49758445192.168.2.7130.135.246.132
                                            Jan 15, 2025 03:00:10.556973934 CET44549758130.135.246.132192.168.2.7
                                            Jan 15, 2025 03:00:10.557054043 CET49758445192.168.2.7130.135.246.132
                                            Jan 15, 2025 03:00:10.557149887 CET49758445192.168.2.7130.135.246.132
                                            Jan 15, 2025 03:00:10.557356119 CET49759445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.562623978 CET44549759130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:10.562694073 CET49759445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.562733889 CET49759445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.562829018 CET44549758130.135.246.132192.168.2.7
                                            Jan 15, 2025 03:00:10.562887907 CET49758445192.168.2.7130.135.246.132
                                            Jan 15, 2025 03:00:10.564053059 CET49760445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.568046093 CET44549759130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:10.568176985 CET49759445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.568835020 CET44549760130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:10.568901062 CET49760445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.568944931 CET49760445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:10.573715925 CET44549760130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:10.581598043 CET49677443192.168.2.720.50.201.200
                                            Jan 15, 2025 03:00:12.567588091 CET49793445192.168.2.782.67.136.15
                                            Jan 15, 2025 03:00:12.743976116 CET4454979382.67.136.15192.168.2.7
                                            Jan 15, 2025 03:00:12.744143009 CET49793445192.168.2.782.67.136.15
                                            Jan 15, 2025 03:00:12.744143963 CET49793445192.168.2.782.67.136.15
                                            Jan 15, 2025 03:00:12.744543076 CET49795445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.749074936 CET4454979382.67.136.15192.168.2.7
                                            Jan 15, 2025 03:00:12.749126911 CET49793445192.168.2.782.67.136.15
                                            Jan 15, 2025 03:00:12.749322891 CET4454979582.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:12.749573946 CET49795445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.749573946 CET49795445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.752042055 CET49799445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.754645109 CET4454979582.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:12.755333900 CET49795445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.756810904 CET4454979982.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:12.756871939 CET49799445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.756937027 CET49799445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:12.761722088 CET4454979982.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:12.899646997 CET44349703104.98.116.138192.168.2.7
                                            Jan 15, 2025 03:00:12.899758101 CET49703443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:14.689836979 CET49823445192.168.2.729.25.90.136
                                            Jan 15, 2025 03:00:14.694669962 CET4454982329.25.90.136192.168.2.7
                                            Jan 15, 2025 03:00:14.694724083 CET49823445192.168.2.729.25.90.136
                                            Jan 15, 2025 03:00:14.696959972 CET49823445192.168.2.729.25.90.136
                                            Jan 15, 2025 03:00:14.697146893 CET49826445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.701755047 CET4454982329.25.90.136192.168.2.7
                                            Jan 15, 2025 03:00:14.701812029 CET49823445192.168.2.729.25.90.136
                                            Jan 15, 2025 03:00:14.701986074 CET4454982629.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:14.702049971 CET49826445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.705096006 CET49826445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.709955931 CET4454982629.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:14.710045099 CET49826445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.719855070 CET49830445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.724785089 CET4454983029.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:14.724875927 CET49830445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.752827883 CET49830445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:14.757813931 CET4454983029.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:16.693434000 CET49862445192.168.2.779.119.108.133
                                            Jan 15, 2025 03:00:16.698292971 CET4454986279.119.108.133192.168.2.7
                                            Jan 15, 2025 03:00:16.698379040 CET49862445192.168.2.779.119.108.133
                                            Jan 15, 2025 03:00:16.698451042 CET49862445192.168.2.779.119.108.133
                                            Jan 15, 2025 03:00:16.698632002 CET49863445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.703397036 CET4454986279.119.108.133192.168.2.7
                                            Jan 15, 2025 03:00:16.703413963 CET4454986379.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:16.703491926 CET49862445192.168.2.779.119.108.133
                                            Jan 15, 2025 03:00:16.703491926 CET49863445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.703587055 CET49863445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.704729080 CET49864445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.708496094 CET4454986379.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:16.708553076 CET49863445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.709526062 CET4454986479.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:16.709633112 CET49864445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.709633112 CET49864445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:16.714461088 CET4454986479.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:18.707995892 CET49897445192.168.2.7137.90.115.232
                                            Jan 15, 2025 03:00:18.713001013 CET44549897137.90.115.232192.168.2.7
                                            Jan 15, 2025 03:00:18.713085890 CET49897445192.168.2.7137.90.115.232
                                            Jan 15, 2025 03:00:18.713145971 CET49897445192.168.2.7137.90.115.232
                                            Jan 15, 2025 03:00:18.713340044 CET49898445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.718734980 CET44549897137.90.115.232192.168.2.7
                                            Jan 15, 2025 03:00:18.718799114 CET49897445192.168.2.7137.90.115.232
                                            Jan 15, 2025 03:00:18.719103098 CET44549898137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:18.719167948 CET49898445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.719254971 CET49898445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.720191002 CET49899445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.724234104 CET44549898137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:18.724294901 CET49898445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.725230932 CET44549899137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:18.725307941 CET49899445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.725383997 CET49899445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:18.730181932 CET44549899137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:20.867320061 CET49935445192.168.2.7128.6.201.45
                                            Jan 15, 2025 03:00:20.872139931 CET44549935128.6.201.45192.168.2.7
                                            Jan 15, 2025 03:00:20.872250080 CET49935445192.168.2.7128.6.201.45
                                            Jan 15, 2025 03:00:20.872272015 CET49935445192.168.2.7128.6.201.45
                                            Jan 15, 2025 03:00:20.872492075 CET49937445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.877449989 CET44549935128.6.201.45192.168.2.7
                                            Jan 15, 2025 03:00:20.877469063 CET44549937128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:20.877497911 CET49935445192.168.2.7128.6.201.45
                                            Jan 15, 2025 03:00:20.877542973 CET49937445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.877614975 CET49937445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.882620096 CET44549937128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:20.882683992 CET49937445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.886421919 CET49938445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.891221046 CET44549938128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:20.891344070 CET49938445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.891463041 CET49938445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:20.896256924 CET44549938128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:21.678040028 CET49703443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:21.678589106 CET49948443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:21.678648949 CET44349948104.98.116.138192.168.2.7
                                            Jan 15, 2025 03:00:21.679335117 CET49948443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:21.682796955 CET44349703104.98.116.138192.168.2.7
                                            Jan 15, 2025 03:00:21.683649063 CET49948443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:00:21.683670998 CET44349948104.98.116.138192.168.2.7
                                            Jan 15, 2025 03:00:22.487935066 CET49677443192.168.2.720.50.201.200
                                            Jan 15, 2025 03:00:22.832380056 CET49969445192.168.2.7139.72.231.26
                                            Jan 15, 2025 03:00:22.837169886 CET44549969139.72.231.26192.168.2.7
                                            Jan 15, 2025 03:00:22.837265015 CET49969445192.168.2.7139.72.231.26
                                            Jan 15, 2025 03:00:22.837297916 CET49969445192.168.2.7139.72.231.26
                                            Jan 15, 2025 03:00:22.837430000 CET49970445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.842220068 CET44549970139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:22.842233896 CET44549969139.72.231.26192.168.2.7
                                            Jan 15, 2025 03:00:22.842335939 CET49969445192.168.2.7139.72.231.26
                                            Jan 15, 2025 03:00:22.842348099 CET49970445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.842422009 CET49970445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.842691898 CET49971445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.848494053 CET44549971139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:22.848696947 CET44549970139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:22.848736048 CET49971445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.848756075 CET49970445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.848758936 CET49971445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:22.853563070 CET44549971139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:24.847712040 CET50007445192.168.2.7101.99.113.179
                                            Jan 15, 2025 03:00:24.852560997 CET44550007101.99.113.179192.168.2.7
                                            Jan 15, 2025 03:00:24.852633953 CET50007445192.168.2.7101.99.113.179
                                            Jan 15, 2025 03:00:24.852751017 CET50007445192.168.2.7101.99.113.179
                                            Jan 15, 2025 03:00:24.852952957 CET50008445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.857621908 CET44550007101.99.113.179192.168.2.7
                                            Jan 15, 2025 03:00:24.857788086 CET50007445192.168.2.7101.99.113.179
                                            Jan 15, 2025 03:00:24.857840061 CET44550008101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:24.857964039 CET50008445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.857964039 CET50008445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.858268023 CET50009445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.863097906 CET44550009101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:24.863107920 CET44550008101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:24.863184929 CET50009445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.863184929 CET50008445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.863203049 CET50009445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:24.867993116 CET44550009101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:26.863379002 CET50040445192.168.2.7137.97.46.109
                                            Jan 15, 2025 03:00:26.868290901 CET44550040137.97.46.109192.168.2.7
                                            Jan 15, 2025 03:00:26.868366957 CET50040445192.168.2.7137.97.46.109
                                            Jan 15, 2025 03:00:26.868398905 CET50040445192.168.2.7137.97.46.109
                                            Jan 15, 2025 03:00:26.868606091 CET50041445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.873424053 CET44550041137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:26.873486996 CET50041445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.873516083 CET50041445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.873522997 CET44550040137.97.46.109192.168.2.7
                                            Jan 15, 2025 03:00:26.873574018 CET50040445192.168.2.7137.97.46.109
                                            Jan 15, 2025 03:00:26.873830080 CET50042445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.878663063 CET44550041137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:26.878674030 CET44550042137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:26.878736019 CET50041445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.878767014 CET50042445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.878803968 CET50042445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:26.883569002 CET44550042137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:28.881820917 CET50077445192.168.2.7179.41.181.141
                                            Jan 15, 2025 03:00:28.886740923 CET44550077179.41.181.141192.168.2.7
                                            Jan 15, 2025 03:00:28.886804104 CET50077445192.168.2.7179.41.181.141
                                            Jan 15, 2025 03:00:28.886887074 CET50077445192.168.2.7179.41.181.141
                                            Jan 15, 2025 03:00:28.887070894 CET50078445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.891791105 CET44550077179.41.181.141192.168.2.7
                                            Jan 15, 2025 03:00:28.891860008 CET50077445192.168.2.7179.41.181.141
                                            Jan 15, 2025 03:00:28.891872883 CET44550078179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:28.891927958 CET50078445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.892002106 CET50078445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.892337084 CET50079445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.896913052 CET44550078179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:28.896974087 CET50078445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.897114992 CET44550079179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:28.897170067 CET50079445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.897209883 CET50079445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:28.902148008 CET44550079179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:29.978089094 CET4454971921.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:29.978168011 CET49719445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:29.978214025 CET49719445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:29.978277922 CET49719445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:29.982971907 CET4454971921.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:29.982995033 CET4454971921.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:30.894726992 CET50115445192.168.2.733.25.92.2
                                            Jan 15, 2025 03:00:30.899554968 CET4455011533.25.92.2192.168.2.7
                                            Jan 15, 2025 03:00:30.899636984 CET50115445192.168.2.733.25.92.2
                                            Jan 15, 2025 03:00:30.899736881 CET50115445192.168.2.733.25.92.2
                                            Jan 15, 2025 03:00:30.899847031 CET50116445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.904695988 CET4455011633.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:30.904707909 CET4455011533.25.92.2192.168.2.7
                                            Jan 15, 2025 03:00:30.904778004 CET50115445192.168.2.733.25.92.2
                                            Jan 15, 2025 03:00:30.904792070 CET50116445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.904822111 CET50116445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.905225039 CET50117445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.909791946 CET4455011633.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:30.909848928 CET50116445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.909970045 CET4455011733.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:30.910028934 CET50117445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.910068035 CET50117445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:30.914792061 CET4455011733.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:31.948643923 CET44549760130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:31.948718071 CET49760445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:31.948798895 CET49760445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:31.948880911 CET49760445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:31.953593969 CET44549760130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:31.953659058 CET44549760130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:32.910903931 CET50149445192.168.2.752.82.147.97
                                            Jan 15, 2025 03:00:32.915771961 CET4455014952.82.147.97192.168.2.7
                                            Jan 15, 2025 03:00:32.915838957 CET50149445192.168.2.752.82.147.97
                                            Jan 15, 2025 03:00:32.915975094 CET50149445192.168.2.752.82.147.97
                                            Jan 15, 2025 03:00:32.916172028 CET50150445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.920900106 CET4455014952.82.147.97192.168.2.7
                                            Jan 15, 2025 03:00:32.920949936 CET50149445192.168.2.752.82.147.97
                                            Jan 15, 2025 03:00:32.921001911 CET4455015052.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:32.921058893 CET50150445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.921184063 CET50150445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.925838947 CET50151445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.926105022 CET4455015052.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:32.926151991 CET50150445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.931844950 CET4455015152.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:32.931914091 CET50151445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.932015896 CET50151445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:32.938254118 CET4455015152.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:32.988643885 CET50154445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:32.993453026 CET4455015421.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:32.993536949 CET50154445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:32.993603945 CET50154445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:32.998425007 CET4455015421.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:34.116733074 CET4454979982.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:34.116821051 CET49799445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:34.116873026 CET49799445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:34.116944075 CET49799445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:34.121771097 CET4454979982.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:34.121779919 CET4454979982.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:34.926040888 CET50178445192.168.2.7210.248.16.242
                                            Jan 15, 2025 03:00:34.931030035 CET44550178210.248.16.242192.168.2.7
                                            Jan 15, 2025 03:00:34.931210995 CET50178445192.168.2.7210.248.16.242
                                            Jan 15, 2025 03:00:34.931265116 CET50178445192.168.2.7210.248.16.242
                                            Jan 15, 2025 03:00:34.931499958 CET50179445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.936418056 CET44550179210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:34.936467886 CET44550178210.248.16.242192.168.2.7
                                            Jan 15, 2025 03:00:34.936501026 CET44550178210.248.16.242192.168.2.7
                                            Jan 15, 2025 03:00:34.936503887 CET50179445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.936552048 CET50178445192.168.2.7210.248.16.242
                                            Jan 15, 2025 03:00:34.936665058 CET50179445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.936933041 CET50180445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.941781044 CET44550179210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:34.941813946 CET44550180210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:34.941859007 CET50179445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.941889048 CET50180445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.941940069 CET50180445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:34.946696043 CET44550180210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:34.957039118 CET50181445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:34.961819887 CET44550181130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:34.961914062 CET50181445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:34.961973906 CET50181445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:34.966743946 CET44550181130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:36.134352922 CET4454983029.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:36.134414911 CET49830445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:36.134466887 CET49830445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:36.139254093 CET4454983029.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:36.941605091 CET50192445192.168.2.768.9.245.163
                                            Jan 15, 2025 03:00:36.946485043 CET4455019268.9.245.163192.168.2.7
                                            Jan 15, 2025 03:00:36.950448036 CET50192445192.168.2.768.9.245.163
                                            Jan 15, 2025 03:00:36.950520992 CET50192445192.168.2.768.9.245.163
                                            Jan 15, 2025 03:00:36.950741053 CET50193445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.955888987 CET4455019368.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:36.955961943 CET50193445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.956027985 CET50193445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.956095934 CET4455019268.9.245.163192.168.2.7
                                            Jan 15, 2025 03:00:36.956228971 CET50192445192.168.2.768.9.245.163
                                            Jan 15, 2025 03:00:36.956415892 CET50194445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.960890055 CET4455019368.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:36.960966110 CET50193445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.961152077 CET4455019468.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:36.961726904 CET50194445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.961762905 CET50194445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:36.966567993 CET4455019468.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:37.128844023 CET50197445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:37.133634090 CET4455019782.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:37.133702040 CET50197445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:37.133728027 CET50197445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:37.138577938 CET4455019782.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:38.069957972 CET4454986479.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:38.070228100 CET49864445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:38.070228100 CET49864445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:38.070558071 CET49864445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:38.075041056 CET4454986479.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:38.075380087 CET4454986479.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:39.022367001 CET50211445192.168.2.739.160.83.10
                                            Jan 15, 2025 03:00:39.027306080 CET4455021139.160.83.10192.168.2.7
                                            Jan 15, 2025 03:00:39.027419090 CET50211445192.168.2.739.160.83.10
                                            Jan 15, 2025 03:00:39.027672052 CET50211445192.168.2.739.160.83.10
                                            Jan 15, 2025 03:00:39.031384945 CET50212445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.032483101 CET4455021139.160.83.10192.168.2.7
                                            Jan 15, 2025 03:00:39.032536030 CET50211445192.168.2.739.160.83.10
                                            Jan 15, 2025 03:00:39.036144972 CET4455021239.160.83.1192.168.2.7
                                            Jan 15, 2025 03:00:39.036235094 CET50212445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.085244894 CET50212445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.090135098 CET4455021239.160.83.1192.168.2.7
                                            Jan 15, 2025 03:00:39.090224981 CET50212445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.102180958 CET50213445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.107045889 CET4455021339.160.83.1192.168.2.7
                                            Jan 15, 2025 03:00:39.107141972 CET50213445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.107186079 CET50213445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:00:39.111932993 CET4455021339.160.83.1192.168.2.7
                                            Jan 15, 2025 03:00:39.162163973 CET50214445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:39.167363882 CET4455021429.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:39.167467117 CET50214445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:39.197747946 CET50214445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:00:39.202625036 CET4455021429.25.90.1192.168.2.7
                                            Jan 15, 2025 03:00:40.114890099 CET44549899137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:40.115019083 CET49899445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:40.115123987 CET49899445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:40.115209103 CET49899445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:40.119915009 CET44549899137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:40.119935036 CET44549899137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:41.020148039 CET50225445192.168.2.749.107.0.12
                                            Jan 15, 2025 03:00:41.026729107 CET4455022549.107.0.12192.168.2.7
                                            Jan 15, 2025 03:00:41.026909113 CET50225445192.168.2.749.107.0.12
                                            Jan 15, 2025 03:00:41.027043104 CET50225445192.168.2.749.107.0.12
                                            Jan 15, 2025 03:00:41.027307034 CET50226445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.033951044 CET4455022649.107.0.1192.168.2.7
                                            Jan 15, 2025 03:00:41.034085989 CET4455022549.107.0.12192.168.2.7
                                            Jan 15, 2025 03:00:41.034168959 CET50225445192.168.2.749.107.0.12
                                            Jan 15, 2025 03:00:41.034323931 CET50226445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.034324884 CET50226445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.034750938 CET50227445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.043206930 CET4455022649.107.0.1192.168.2.7
                                            Jan 15, 2025 03:00:41.043236017 CET4455022749.107.0.1192.168.2.7
                                            Jan 15, 2025 03:00:41.043334961 CET50226445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.043356895 CET50227445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.043415070 CET50227445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:00:41.050127983 CET4455022749.107.0.1192.168.2.7
                                            Jan 15, 2025 03:00:41.082170010 CET50228445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:41.087517023 CET4455022879.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:41.087667942 CET50228445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:41.087706089 CET50228445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:00:41.093523979 CET4455022879.119.108.1192.168.2.7
                                            Jan 15, 2025 03:00:42.290821075 CET44549938128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:42.290936947 CET49938445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:42.293366909 CET49938445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:42.293421984 CET49938445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:42.298382044 CET44549938128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:42.298401117 CET44549938128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:43.048353910 CET50240445192.168.2.725.91.69.89
                                            Jan 15, 2025 03:00:43.054804087 CET4455024025.91.69.89192.168.2.7
                                            Jan 15, 2025 03:00:43.054881096 CET50240445192.168.2.725.91.69.89
                                            Jan 15, 2025 03:00:43.055270910 CET50240445192.168.2.725.91.69.89
                                            Jan 15, 2025 03:00:43.055592060 CET50241445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.062367916 CET4455024125.91.69.1192.168.2.7
                                            Jan 15, 2025 03:00:43.062387943 CET4455024025.91.69.89192.168.2.7
                                            Jan 15, 2025 03:00:43.062427998 CET50241445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.062455893 CET50240445192.168.2.725.91.69.89
                                            Jan 15, 2025 03:00:43.062555075 CET50241445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.063417912 CET50243445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.069349051 CET4455024125.91.69.1192.168.2.7
                                            Jan 15, 2025 03:00:43.069405079 CET50241445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.071054935 CET4455024325.91.69.1192.168.2.7
                                            Jan 15, 2025 03:00:43.071110010 CET50243445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.071329117 CET50243445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:00:43.079128981 CET4455024325.91.69.1192.168.2.7
                                            Jan 15, 2025 03:00:43.133554935 CET50244445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:43.140304089 CET44550244137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:43.140388966 CET50244445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:43.140584946 CET50244445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:00:43.147259951 CET44550244137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:00:44.208794117 CET44549971139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:44.210592985 CET49971445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:44.210633039 CET49971445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:44.210653067 CET49971445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:44.215405941 CET44549971139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:44.215416908 CET44549971139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:44.925911903 CET50255445192.168.2.7213.65.203.43
                                            Jan 15, 2025 03:00:44.930784941 CET44550255213.65.203.43192.168.2.7
                                            Jan 15, 2025 03:00:44.930875063 CET50255445192.168.2.7213.65.203.43
                                            Jan 15, 2025 03:00:44.930897951 CET50255445192.168.2.7213.65.203.43
                                            Jan 15, 2025 03:00:44.931035042 CET50256445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.935834885 CET44550256213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:44.935904980 CET50256445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.935942888 CET50256445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.935952902 CET44550255213.65.203.43192.168.2.7
                                            Jan 15, 2025 03:00:44.935993910 CET50255445192.168.2.7213.65.203.43
                                            Jan 15, 2025 03:00:44.936321020 CET50257445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.940867901 CET44550256213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:44.940929890 CET50256445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.941211939 CET44550257213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:44.941267014 CET50257445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.941334009 CET50257445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:44.946223974 CET44550257213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:45.300792933 CET50260445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:45.305619955 CET44550260128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:45.305708885 CET50260445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:45.305754900 CET50260445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:00:45.310576916 CET44550260128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:00:46.241008997 CET44550009101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:46.241137981 CET50009445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:46.241211891 CET50009445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:46.241266966 CET50009445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:46.246102095 CET44550009101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:46.246119022 CET44550009101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:46.584448099 CET44550257213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:46.584549904 CET50257445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:46.584549904 CET50257445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:46.584605932 CET50257445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:46.593396902 CET44550257213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:46.593410969 CET44550257213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:46.676306009 CET50270445192.168.2.745.143.124.41
                                            Jan 15, 2025 03:00:46.681325912 CET4455027045.143.124.41192.168.2.7
                                            Jan 15, 2025 03:00:46.681391001 CET50270445192.168.2.745.143.124.41
                                            Jan 15, 2025 03:00:46.681566954 CET50270445192.168.2.745.143.124.41
                                            Jan 15, 2025 03:00:46.681761026 CET50271445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.686379910 CET4455027045.143.124.41192.168.2.7
                                            Jan 15, 2025 03:00:46.686449051 CET50270445192.168.2.745.143.124.41
                                            Jan 15, 2025 03:00:46.686614990 CET4455027145.143.124.1192.168.2.7
                                            Jan 15, 2025 03:00:46.686686993 CET50271445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.686726093 CET50271445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.687256098 CET50272445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.691749096 CET4455027145.143.124.1192.168.2.7
                                            Jan 15, 2025 03:00:46.691812038 CET50271445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.692105055 CET4455027245.143.124.1192.168.2.7
                                            Jan 15, 2025 03:00:46.692177057 CET50272445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.692210913 CET50272445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:00:46.697010994 CET4455027245.143.124.1192.168.2.7
                                            Jan 15, 2025 03:00:47.222610950 CET50276445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:47.228758097 CET44550276139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:47.228840113 CET50276445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:47.228873014 CET50276445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:00:47.233665943 CET44550276139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:00:48.287167072 CET44550042137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:48.287415028 CET50042445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:48.287415028 CET50042445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:48.287487984 CET50042445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:48.292300940 CET44550042137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:48.292341948 CET44550042137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:48.316788912 CET50282445192.168.2.758.155.88.127
                                            Jan 15, 2025 03:00:48.321623087 CET4455028258.155.88.127192.168.2.7
                                            Jan 15, 2025 03:00:48.321722031 CET50282445192.168.2.758.155.88.127
                                            Jan 15, 2025 03:00:48.321788073 CET50282445192.168.2.758.155.88.127
                                            Jan 15, 2025 03:00:48.321953058 CET50283445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.326677084 CET4455028258.155.88.127192.168.2.7
                                            Jan 15, 2025 03:00:48.326698065 CET4455028358.155.88.1192.168.2.7
                                            Jan 15, 2025 03:00:48.326735973 CET50282445192.168.2.758.155.88.127
                                            Jan 15, 2025 03:00:48.326766968 CET50283445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.326867104 CET50283445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.327303886 CET50284445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.331718922 CET4455028358.155.88.1192.168.2.7
                                            Jan 15, 2025 03:00:48.331782103 CET50283445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.332211971 CET4455028458.155.88.1192.168.2.7
                                            Jan 15, 2025 03:00:48.332279921 CET50284445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.332325935 CET50284445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:00:48.337161064 CET4455028458.155.88.1192.168.2.7
                                            Jan 15, 2025 03:00:49.253874063 CET50291445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:49.258658886 CET44550291101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:49.258867979 CET50291445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:49.258907080 CET50291445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:00:49.263642073 CET44550291101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:00:49.597623110 CET50292445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:49.602499962 CET44550292213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:49.602699041 CET50292445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:49.602734089 CET50292445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:49.607532024 CET44550292213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:49.848011971 CET50293445192.168.2.731.90.249.196
                                            Jan 15, 2025 03:00:49.854530096 CET4455029331.90.249.196192.168.2.7
                                            Jan 15, 2025 03:00:49.854640961 CET50293445192.168.2.731.90.249.196
                                            Jan 15, 2025 03:00:49.854655027 CET50293445192.168.2.731.90.249.196
                                            Jan 15, 2025 03:00:49.854780912 CET50294445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.859483957 CET4455029431.90.249.1192.168.2.7
                                            Jan 15, 2025 03:00:49.859544992 CET50294445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.859646082 CET50294445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.859709024 CET4455029331.90.249.196192.168.2.7
                                            Jan 15, 2025 03:00:49.859755039 CET50293445192.168.2.731.90.249.196
                                            Jan 15, 2025 03:00:49.860004902 CET50295445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.864464998 CET4455029431.90.249.1192.168.2.7
                                            Jan 15, 2025 03:00:49.864522934 CET50294445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.864835978 CET4455029531.90.249.1192.168.2.7
                                            Jan 15, 2025 03:00:49.864901066 CET50295445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.864970922 CET50295445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:00:49.869786024 CET4455029531.90.249.1192.168.2.7
                                            Jan 15, 2025 03:00:50.292778969 CET44550079179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:50.292921066 CET50079445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:50.292962074 CET50079445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:50.293009996 CET50079445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:50.297795057 CET44550079179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:50.297811031 CET44550079179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:51.270159960 CET50306445192.168.2.7147.122.230.56
                                            Jan 15, 2025 03:00:51.275156021 CET44550306147.122.230.56192.168.2.7
                                            Jan 15, 2025 03:00:51.275289059 CET50306445192.168.2.7147.122.230.56
                                            Jan 15, 2025 03:00:51.275363922 CET50306445192.168.2.7147.122.230.56
                                            Jan 15, 2025 03:00:51.275629044 CET50307445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.275877953 CET44550292213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:51.275949955 CET50292445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:51.275984049 CET50292445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:51.276024103 CET50292445192.168.2.7213.65.203.1
                                            Jan 15, 2025 03:00:51.280318975 CET44550306147.122.230.56192.168.2.7
                                            Jan 15, 2025 03:00:51.280431986 CET44550306147.122.230.56192.168.2.7
                                            Jan 15, 2025 03:00:51.280484915 CET50306445192.168.2.7147.122.230.56
                                            Jan 15, 2025 03:00:51.280522108 CET44550307147.122.230.1192.168.2.7
                                            Jan 15, 2025 03:00:51.280580044 CET50307445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.280617952 CET50307445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.280873060 CET44550292213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:51.280901909 CET50308445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.280901909 CET44550292213.65.203.1192.168.2.7
                                            Jan 15, 2025 03:00:51.287120104 CET44550307147.122.230.1192.168.2.7
                                            Jan 15, 2025 03:00:51.287199974 CET50307445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.288024902 CET44550308147.122.230.1192.168.2.7
                                            Jan 15, 2025 03:00:51.288095951 CET50308445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.288161039 CET50308445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:00:51.294612885 CET44550308147.122.230.1192.168.2.7
                                            Jan 15, 2025 03:00:51.300919056 CET50309445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:51.305847883 CET44550309137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:51.305927038 CET50309445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:51.305953979 CET50309445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:00:51.310832977 CET44550309137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:00:51.332371950 CET50310445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.337336063 CET44550310213.65.203.2192.168.2.7
                                            Jan 15, 2025 03:00:51.337502956 CET50310445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.337680101 CET50310445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.338182926 CET50311445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.342573881 CET44550310213.65.203.2192.168.2.7
                                            Jan 15, 2025 03:00:51.342643976 CET50310445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.343002081 CET44550311213.65.203.2192.168.2.7
                                            Jan 15, 2025 03:00:51.343074083 CET50311445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.343106985 CET50311445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:00:51.348001003 CET44550311213.65.203.2192.168.2.7
                                            Jan 15, 2025 03:00:52.306528091 CET4455011733.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:52.306587934 CET50117445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:52.306613922 CET50117445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:52.306654930 CET50117445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:52.311484098 CET4455011733.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:52.311496973 CET4455011733.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:52.598002911 CET50316445192.168.2.764.205.237.41
                                            Jan 15, 2025 03:00:52.602982998 CET4455031664.205.237.41192.168.2.7
                                            Jan 15, 2025 03:00:52.603199005 CET50316445192.168.2.764.205.237.41
                                            Jan 15, 2025 03:00:52.603199959 CET50316445192.168.2.764.205.237.41
                                            Jan 15, 2025 03:00:52.603265047 CET50317445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.608314037 CET4455031664.205.237.41192.168.2.7
                                            Jan 15, 2025 03:00:52.608349085 CET4455031764.205.237.1192.168.2.7
                                            Jan 15, 2025 03:00:52.608386993 CET50316445192.168.2.764.205.237.41
                                            Jan 15, 2025 03:00:52.608431101 CET50317445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.608480930 CET50317445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.608731985 CET50318445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.613394022 CET4455031764.205.237.1192.168.2.7
                                            Jan 15, 2025 03:00:52.613454103 CET50317445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.613552094 CET4455031864.205.237.1192.168.2.7
                                            Jan 15, 2025 03:00:52.613619089 CET50318445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.613656998 CET50318445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:00:52.618443966 CET4455031864.205.237.1192.168.2.7
                                            Jan 15, 2025 03:00:53.300833941 CET50319445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:53.305840015 CET44550319179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:53.305936098 CET50319445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:53.305970907 CET50319445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:00:53.310810089 CET44550319179.41.181.1192.168.2.7
                                            Jan 15, 2025 03:00:53.835760117 CET50320445192.168.2.7158.149.209.150
                                            Jan 15, 2025 03:00:53.840784073 CET44550320158.149.209.150192.168.2.7
                                            Jan 15, 2025 03:00:53.840876102 CET50320445192.168.2.7158.149.209.150
                                            Jan 15, 2025 03:00:53.843066931 CET50320445192.168.2.7158.149.209.150
                                            Jan 15, 2025 03:00:53.843136072 CET50321445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.847877026 CET44550320158.149.209.150192.168.2.7
                                            Jan 15, 2025 03:00:53.847910881 CET44550321158.149.209.1192.168.2.7
                                            Jan 15, 2025 03:00:53.847961903 CET50320445192.168.2.7158.149.209.150
                                            Jan 15, 2025 03:00:53.847990036 CET50321445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.850719929 CET50321445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.854481936 CET50322445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.855575085 CET44550321158.149.209.1192.168.2.7
                                            Jan 15, 2025 03:00:53.855638027 CET50321445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.859365940 CET44550322158.149.209.1192.168.2.7
                                            Jan 15, 2025 03:00:53.859440088 CET50322445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.861939907 CET50322445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:00:53.866765976 CET44550322158.149.209.1192.168.2.7
                                            Jan 15, 2025 03:00:54.287296057 CET4455015152.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:54.287381887 CET50151445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:54.288069963 CET50151445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:54.288460970 CET50151445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:54.294146061 CET4455015152.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:54.294650078 CET4455015152.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:54.367034912 CET4455015421.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:54.367125988 CET50154445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:54.381295919 CET50154445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:54.381340981 CET50154445192.168.2.721.98.72.1
                                            Jan 15, 2025 03:00:54.386185884 CET4455015421.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:54.386217117 CET4455015421.98.72.1192.168.2.7
                                            Jan 15, 2025 03:00:54.450458050 CET50323445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.455480099 CET4455032321.98.72.2192.168.2.7
                                            Jan 15, 2025 03:00:54.455549955 CET50323445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.455610037 CET50323445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.455933094 CET50324445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.460536003 CET4455032321.98.72.2192.168.2.7
                                            Jan 15, 2025 03:00:54.460589886 CET50323445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.460738897 CET4455032421.98.72.2192.168.2.7
                                            Jan 15, 2025 03:00:54.460798979 CET50324445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.460881948 CET50324445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:00:54.465739012 CET4455032421.98.72.2192.168.2.7
                                            Jan 15, 2025 03:00:54.988562107 CET50325445192.168.2.791.64.225.197
                                            Jan 15, 2025 03:00:54.993544102 CET4455032591.64.225.197192.168.2.7
                                            Jan 15, 2025 03:00:54.993684053 CET50325445192.168.2.791.64.225.197
                                            Jan 15, 2025 03:00:54.993722916 CET50325445192.168.2.791.64.225.197
                                            Jan 15, 2025 03:00:54.993829966 CET50326445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:54.998764038 CET4455032691.64.225.1192.168.2.7
                                            Jan 15, 2025 03:00:54.998796940 CET4455032591.64.225.197192.168.2.7
                                            Jan 15, 2025 03:00:54.998835087 CET50326445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:54.998851061 CET50326445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:54.998857975 CET50325445192.168.2.791.64.225.197
                                            Jan 15, 2025 03:00:54.999151945 CET50327445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:55.003909111 CET4455032691.64.225.1192.168.2.7
                                            Jan 15, 2025 03:00:55.003994942 CET4455032791.64.225.1192.168.2.7
                                            Jan 15, 2025 03:00:55.003998995 CET50326445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:55.004053116 CET50327445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:55.004079103 CET50327445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:00:55.008862972 CET4455032791.64.225.1192.168.2.7
                                            Jan 15, 2025 03:00:55.316509962 CET50328445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:55.321394920 CET4455032833.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:55.321494102 CET50328445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:55.321530104 CET50328445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:00:55.328142881 CET4455032833.25.92.1192.168.2.7
                                            Jan 15, 2025 03:00:56.066710949 CET50329445192.168.2.735.213.56.185
                                            Jan 15, 2025 03:00:56.071681976 CET4455032935.213.56.185192.168.2.7
                                            Jan 15, 2025 03:00:56.071769953 CET50329445192.168.2.735.213.56.185
                                            Jan 15, 2025 03:00:56.071782112 CET50329445192.168.2.735.213.56.185
                                            Jan 15, 2025 03:00:56.071935892 CET50330445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:00:56.076788902 CET4455033035.213.56.1192.168.2.7
                                            Jan 15, 2025 03:00:56.076801062 CET4455032935.213.56.185192.168.2.7
                                            Jan 15, 2025 03:00:56.076864958 CET50329445192.168.2.735.213.56.185
                                            Jan 15, 2025 03:00:56.077142000 CET50331445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:00:56.077147961 CET50330445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:00:56.081939936 CET4455033135.213.56.1192.168.2.7
                                            Jan 15, 2025 03:00:56.082006931 CET50331445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:00:56.082022905 CET50331445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:00:56.082036018 CET4455033035.213.56.1192.168.2.7
                                            Jan 15, 2025 03:00:56.082079887 CET50330445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:00:56.086807013 CET4455033135.213.56.1192.168.2.7
                                            Jan 15, 2025 03:00:56.287997007 CET44550180210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:56.288100958 CET50180445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:56.288149118 CET50180445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:56.288199902 CET50180445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:56.292918921 CET44550180210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:56.292960882 CET44550180210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:56.352634907 CET44550181130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:56.352761030 CET50181445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:56.352823019 CET50181445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:56.352888107 CET50181445192.168.2.7130.135.246.1
                                            Jan 15, 2025 03:00:56.357733011 CET44550181130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:56.357749939 CET44550181130.135.246.1192.168.2.7
                                            Jan 15, 2025 03:00:56.411436081 CET50332445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.416557074 CET44550332130.135.246.2192.168.2.7
                                            Jan 15, 2025 03:00:56.416656017 CET50332445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.416686058 CET50332445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.416985035 CET50333445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.423033953 CET44550332130.135.246.2192.168.2.7
                                            Jan 15, 2025 03:00:56.423108101 CET50332445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.423166037 CET44550333130.135.246.2192.168.2.7
                                            Jan 15, 2025 03:00:56.423226118 CET50333445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.423407078 CET50333445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:00:56.429235935 CET44550333130.135.246.2192.168.2.7
                                            Jan 15, 2025 03:00:57.088793039 CET50334445192.168.2.7190.102.160.123
                                            Jan 15, 2025 03:00:57.093848944 CET44550334190.102.160.123192.168.2.7
                                            Jan 15, 2025 03:00:57.093982935 CET50334445192.168.2.7190.102.160.123
                                            Jan 15, 2025 03:00:57.096287012 CET50334445192.168.2.7190.102.160.123
                                            Jan 15, 2025 03:00:57.096502066 CET50335445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.101469040 CET44550334190.102.160.123192.168.2.7
                                            Jan 15, 2025 03:00:57.101546049 CET50334445192.168.2.7190.102.160.123
                                            Jan 15, 2025 03:00:57.101845026 CET44550335190.102.160.1192.168.2.7
                                            Jan 15, 2025 03:00:57.101922035 CET50335445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.105974913 CET50335445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.110759020 CET44550335190.102.160.1192.168.2.7
                                            Jan 15, 2025 03:00:57.110836983 CET50335445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.113398075 CET50336445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.118208885 CET44550336190.102.160.1192.168.2.7
                                            Jan 15, 2025 03:00:57.118284941 CET50336445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.120917082 CET50336445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:00:57.125819921 CET44550336190.102.160.1192.168.2.7
                                            Jan 15, 2025 03:00:57.313312054 CET50337445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:57.318346977 CET4455033752.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:57.318434954 CET50337445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:57.395776033 CET50337445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:00:57.400767088 CET4455033752.82.147.1192.168.2.7
                                            Jan 15, 2025 03:00:58.023171902 CET50338445192.168.2.7162.96.189.18
                                            Jan 15, 2025 03:00:58.028431892 CET44550338162.96.189.18192.168.2.7
                                            Jan 15, 2025 03:00:58.028506994 CET50338445192.168.2.7162.96.189.18
                                            Jan 15, 2025 03:00:58.028561115 CET50338445192.168.2.7162.96.189.18
                                            Jan 15, 2025 03:00:58.028770924 CET50339445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.033462048 CET44550338162.96.189.18192.168.2.7
                                            Jan 15, 2025 03:00:58.033524036 CET50338445192.168.2.7162.96.189.18
                                            Jan 15, 2025 03:00:58.033605099 CET44550339162.96.189.1192.168.2.7
                                            Jan 15, 2025 03:00:58.033699036 CET50339445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.033793926 CET50339445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.034399033 CET50340445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.038652897 CET44550339162.96.189.1192.168.2.7
                                            Jan 15, 2025 03:00:58.038783073 CET50339445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.039345980 CET44550340162.96.189.1192.168.2.7
                                            Jan 15, 2025 03:00:58.039419889 CET50340445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.039465904 CET50340445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:00:58.044230938 CET44550340162.96.189.1192.168.2.7
                                            Jan 15, 2025 03:00:58.318690062 CET4455019468.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:58.318828106 CET50194445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:58.318885088 CET50194445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:58.318938971 CET50194445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:00:58.323824883 CET4455019468.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:58.323857069 CET4455019468.9.245.1192.168.2.7
                                            Jan 15, 2025 03:00:58.510148048 CET4455019782.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:58.510271072 CET50197445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:58.510313988 CET50197445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:58.510375977 CET50197445192.168.2.782.67.136.1
                                            Jan 15, 2025 03:00:58.515136957 CET4455019782.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:58.515233994 CET4455019782.67.136.1192.168.2.7
                                            Jan 15, 2025 03:00:58.566658974 CET50341445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.571542978 CET4455034182.67.136.2192.168.2.7
                                            Jan 15, 2025 03:00:58.571671963 CET50341445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.571671963 CET50341445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.572058916 CET50342445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.576611042 CET4455034182.67.136.2192.168.2.7
                                            Jan 15, 2025 03:00:58.576694012 CET50341445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.576786995 CET4455034282.67.136.2192.168.2.7
                                            Jan 15, 2025 03:00:58.576988935 CET50342445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.577040911 CET50342445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:00:58.581782103 CET4455034282.67.136.2192.168.2.7
                                            Jan 15, 2025 03:00:58.910480976 CET50343445192.168.2.7128.245.153.25
                                            Jan 15, 2025 03:00:58.915504932 CET44550343128.245.153.25192.168.2.7
                                            Jan 15, 2025 03:00:58.917406082 CET50343445192.168.2.7128.245.153.25
                                            Jan 15, 2025 03:00:58.917496920 CET50343445192.168.2.7128.245.153.25
                                            Jan 15, 2025 03:00:58.917728901 CET50344445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.922584057 CET44550343128.245.153.25192.168.2.7
                                            Jan 15, 2025 03:00:58.922657967 CET50343445192.168.2.7128.245.153.25
                                            Jan 15, 2025 03:00:58.922702074 CET44550344128.245.153.1192.168.2.7
                                            Jan 15, 2025 03:00:58.922771931 CET50344445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.922801018 CET50344445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.923090935 CET50345445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.927748919 CET44550344128.245.153.1192.168.2.7
                                            Jan 15, 2025 03:00:58.927814007 CET50344445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.927921057 CET44550345128.245.153.1192.168.2.7
                                            Jan 15, 2025 03:00:58.927992105 CET50345445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.928010941 CET50345445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:00:58.933262110 CET44550345128.245.153.1192.168.2.7
                                            Jan 15, 2025 03:00:59.300865889 CET50346445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:59.305954933 CET44550346210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:59.306081057 CET50346445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:59.306162119 CET50346445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:00:59.310991049 CET44550346210.248.16.1192.168.2.7
                                            Jan 15, 2025 03:00:59.738914967 CET50347445192.168.2.7165.128.219.215
                                            Jan 15, 2025 03:00:59.743927956 CET44550347165.128.219.215192.168.2.7
                                            Jan 15, 2025 03:00:59.744085073 CET50347445192.168.2.7165.128.219.215
                                            Jan 15, 2025 03:00:59.744085073 CET50347445192.168.2.7165.128.219.215
                                            Jan 15, 2025 03:00:59.744229078 CET50348445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.749110937 CET44550348165.128.219.1192.168.2.7
                                            Jan 15, 2025 03:00:59.749166965 CET44550347165.128.219.215192.168.2.7
                                            Jan 15, 2025 03:00:59.749181986 CET50348445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.749227047 CET50347445192.168.2.7165.128.219.215
                                            Jan 15, 2025 03:00:59.749329090 CET50348445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.749650002 CET50349445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.754410982 CET44550348165.128.219.1192.168.2.7
                                            Jan 15, 2025 03:00:59.754481077 CET50348445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.755053043 CET44550349165.128.219.1192.168.2.7
                                            Jan 15, 2025 03:00:59.755125999 CET50349445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.755152941 CET50349445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:00:59.759968996 CET44550349165.128.219.1192.168.2.7
                                            Jan 15, 2025 03:01:00.459832907 CET4455021339.160.83.1192.168.2.7
                                            Jan 15, 2025 03:01:00.459913015 CET50213445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:00.459955931 CET50213445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:00.459995985 CET50213445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:00.464742899 CET4455021339.160.83.1192.168.2.7
                                            Jan 15, 2025 03:01:00.464752913 CET4455021339.160.83.1192.168.2.7
                                            Jan 15, 2025 03:01:00.504144907 CET50351445192.168.2.733.182.69.203
                                            Jan 15, 2025 03:01:00.509040117 CET4455035133.182.69.203192.168.2.7
                                            Jan 15, 2025 03:01:00.509141922 CET50351445192.168.2.733.182.69.203
                                            Jan 15, 2025 03:01:00.509155035 CET50351445192.168.2.733.182.69.203
                                            Jan 15, 2025 03:01:00.509248018 CET50352445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.514216900 CET4455035233.182.69.1192.168.2.7
                                            Jan 15, 2025 03:01:00.514228106 CET4455035133.182.69.203192.168.2.7
                                            Jan 15, 2025 03:01:00.514281988 CET50352445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.514281988 CET50352445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.514298916 CET50351445192.168.2.733.182.69.203
                                            Jan 15, 2025 03:01:00.514571905 CET50353445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.519287109 CET4455035233.182.69.1192.168.2.7
                                            Jan 15, 2025 03:01:00.519344091 CET50352445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.519419909 CET4455035333.182.69.1192.168.2.7
                                            Jan 15, 2025 03:01:00.519473076 CET50353445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.519485950 CET50353445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:00.524249077 CET4455035333.182.69.1192.168.2.7
                                            Jan 15, 2025 03:01:00.539447069 CET4455021429.25.90.1192.168.2.7
                                            Jan 15, 2025 03:01:00.539530039 CET50214445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:01:00.539611101 CET50214445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:01:00.539678097 CET50214445192.168.2.729.25.90.1
                                            Jan 15, 2025 03:01:00.544604063 CET4455021429.25.90.1192.168.2.7
                                            Jan 15, 2025 03:01:00.544622898 CET4455021429.25.90.1192.168.2.7
                                            Jan 15, 2025 03:01:00.597945929 CET50354445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.602842093 CET4455035429.25.90.2192.168.2.7
                                            Jan 15, 2025 03:01:00.602969885 CET50354445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.603027105 CET50354445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.603390932 CET50355445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.607995033 CET4455035429.25.90.2192.168.2.7
                                            Jan 15, 2025 03:01:00.608088970 CET50354445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.608231068 CET4455035529.25.90.2192.168.2.7
                                            Jan 15, 2025 03:01:00.608295918 CET50355445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.608326912 CET50355445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:00.613148928 CET4455035529.25.90.2192.168.2.7
                                            Jan 15, 2025 03:01:01.332025051 CET50357445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:01:01.336947918 CET4455035768.9.245.1192.168.2.7
                                            Jan 15, 2025 03:01:01.337018967 CET50357445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:01:01.337475061 CET50357445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:01:01.342216969 CET4455035768.9.245.1192.168.2.7
                                            Jan 15, 2025 03:01:02.412385941 CET4455022749.107.0.1192.168.2.7
                                            Jan 15, 2025 03:01:02.414676905 CET50227445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:02.437294006 CET50227445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:02.437335968 CET50227445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:02.442140102 CET4455022749.107.0.1192.168.2.7
                                            Jan 15, 2025 03:01:02.442152977 CET4455022749.107.0.1192.168.2.7
                                            Jan 15, 2025 03:01:02.463310957 CET4455022879.119.108.1192.168.2.7
                                            Jan 15, 2025 03:01:02.463540077 CET50228445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:01:02.463588953 CET50228445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:01:02.463654995 CET50228445192.168.2.779.119.108.1
                                            Jan 15, 2025 03:01:02.468346119 CET4455022879.119.108.1192.168.2.7
                                            Jan 15, 2025 03:01:02.468497038 CET4455022879.119.108.1192.168.2.7
                                            Jan 15, 2025 03:01:02.570008039 CET50360445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.574965000 CET4455036079.119.108.2192.168.2.7
                                            Jan 15, 2025 03:01:02.576869965 CET50360445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.582561016 CET50360445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.587368011 CET4455036079.119.108.2192.168.2.7
                                            Jan 15, 2025 03:01:02.589318037 CET50360445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.589318037 CET50362445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.594132900 CET4455036279.119.108.2192.168.2.7
                                            Jan 15, 2025 03:01:02.596373081 CET50362445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.596373081 CET50362445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:02.601136923 CET4455036279.119.108.2192.168.2.7
                                            Jan 15, 2025 03:01:03.472750902 CET50366445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:03.477693081 CET4455036639.160.83.1192.168.2.7
                                            Jan 15, 2025 03:01:03.477866888 CET50366445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:03.477895975 CET50366445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:03.482714891 CET4455036639.160.83.1192.168.2.7
                                            Jan 15, 2025 03:01:04.443799973 CET44349948104.98.116.138192.168.2.7
                                            Jan 15, 2025 03:01:04.445302010 CET4455024325.91.69.1192.168.2.7
                                            Jan 15, 2025 03:01:04.445497990 CET50243445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:04.445497990 CET50243445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:04.445557117 CET50243445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:04.446074009 CET49948443192.168.2.7104.98.116.138
                                            Jan 15, 2025 03:01:04.452558994 CET4455024325.91.69.1192.168.2.7
                                            Jan 15, 2025 03:01:04.452572107 CET4455024325.91.69.1192.168.2.7
                                            Jan 15, 2025 03:01:04.508282900 CET44550244137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:01:04.509504080 CET50244445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:01:04.509550095 CET50244445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:01:04.509618044 CET50244445192.168.2.7137.90.115.1
                                            Jan 15, 2025 03:01:04.514378071 CET44550244137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:01:04.514388084 CET44550244137.90.115.1192.168.2.7
                                            Jan 15, 2025 03:01:04.566787004 CET50373445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.571609020 CET44550373137.90.115.2192.168.2.7
                                            Jan 15, 2025 03:01:04.572629929 CET50373445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.572689056 CET50373445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.573036909 CET50374445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.577599049 CET44550373137.90.115.2192.168.2.7
                                            Jan 15, 2025 03:01:04.577799082 CET44550374137.90.115.2192.168.2.7
                                            Jan 15, 2025 03:01:04.577856064 CET50373445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.577881098 CET50374445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.577919960 CET50374445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:04.582639933 CET44550374137.90.115.2192.168.2.7
                                            Jan 15, 2025 03:01:05.441479921 CET50382445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:05.446619034 CET4455038249.107.0.1192.168.2.7
                                            Jan 15, 2025 03:01:05.446737051 CET50382445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:05.446773052 CET50382445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:05.451611996 CET4455038249.107.0.1192.168.2.7
                                            Jan 15, 2025 03:01:06.662493944 CET44550260128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:01:06.662563086 CET50260445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:01:06.662607908 CET50260445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:01:06.662627935 CET50260445192.168.2.7128.6.201.1
                                            Jan 15, 2025 03:01:06.667409897 CET44550260128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:01:06.667423964 CET44550260128.6.201.1192.168.2.7
                                            Jan 15, 2025 03:01:06.724688053 CET50396445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.729696035 CET44550396128.6.201.2192.168.2.7
                                            Jan 15, 2025 03:01:06.729782104 CET50396445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.729866982 CET50396445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.730223894 CET50397445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.736392975 CET44550397128.6.201.2192.168.2.7
                                            Jan 15, 2025 03:01:06.736465931 CET50397445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.736516953 CET50397445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.736531973 CET44550396128.6.201.2192.168.2.7
                                            Jan 15, 2025 03:01:06.736583948 CET50396445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:06.741349936 CET44550397128.6.201.2192.168.2.7
                                            Jan 15, 2025 03:01:07.457811117 CET50406445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:07.464325905 CET4455040625.91.69.1192.168.2.7
                                            Jan 15, 2025 03:01:07.464473009 CET50406445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:07.464540958 CET50406445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:07.469985008 CET4455040625.91.69.1192.168.2.7
                                            Jan 15, 2025 03:01:08.068243980 CET4455027245.143.124.1192.168.2.7
                                            Jan 15, 2025 03:01:08.068382025 CET50272445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:08.068411112 CET50272445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:08.068434954 CET50272445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:08.073308945 CET4455027245.143.124.1192.168.2.7
                                            Jan 15, 2025 03:01:08.073324919 CET4455027245.143.124.1192.168.2.7
                                            Jan 15, 2025 03:01:08.636928082 CET44550276139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:01:08.637126923 CET50276445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:01:08.637175083 CET50276445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:01:08.637219906 CET50276445192.168.2.7139.72.231.1
                                            Jan 15, 2025 03:01:08.641997099 CET44550276139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:01:08.642013073 CET44550276139.72.231.1192.168.2.7
                                            Jan 15, 2025 03:01:08.691571951 CET50429445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.698191881 CET44550429139.72.231.2192.168.2.7
                                            Jan 15, 2025 03:01:08.698332071 CET50429445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.698379040 CET50429445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.698837042 CET50430445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.705487967 CET44550430139.72.231.2192.168.2.7
                                            Jan 15, 2025 03:01:08.705509901 CET44550429139.72.231.2192.168.2.7
                                            Jan 15, 2025 03:01:08.705596924 CET50429445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.705605030 CET50430445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.705642939 CET50430445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:08.712061882 CET44550430139.72.231.2192.168.2.7
                                            Jan 15, 2025 03:01:09.726818085 CET4455028458.155.88.1192.168.2.7
                                            Jan 15, 2025 03:01:09.726973057 CET50284445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:01:09.727022886 CET50284445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:01:09.727050066 CET50284445192.168.2.758.155.88.1
                                            Jan 15, 2025 03:01:09.731899023 CET4455028458.155.88.1192.168.2.7
                                            Jan 15, 2025 03:01:09.731914043 CET4455028458.155.88.1192.168.2.7
                                            Jan 15, 2025 03:01:10.599639893 CET44550291101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:01:10.599766970 CET50291445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:01:10.599827051 CET50291445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:01:10.599875927 CET50291445192.168.2.7101.99.113.1
                                            Jan 15, 2025 03:01:10.604665995 CET44550291101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:01:10.604680061 CET44550291101.99.113.1192.168.2.7
                                            Jan 15, 2025 03:01:10.660294056 CET50485445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.667892933 CET44550485101.99.113.2192.168.2.7
                                            Jan 15, 2025 03:01:10.667988062 CET50485445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.668064117 CET50485445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.668386936 CET50486445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.674873114 CET44550486101.99.113.2192.168.2.7
                                            Jan 15, 2025 03:01:10.674957037 CET50486445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.674999952 CET50486445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.675168037 CET44550485101.99.113.2192.168.2.7
                                            Jan 15, 2025 03:01:10.675215006 CET50485445192.168.2.7101.99.113.2
                                            Jan 15, 2025 03:01:10.681741953 CET44550486101.99.113.2192.168.2.7
                                            Jan 15, 2025 03:01:11.082299948 CET50505445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:11.087392092 CET4455050545.143.124.1192.168.2.7
                                            Jan 15, 2025 03:01:11.087542057 CET50505445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:11.087570906 CET50505445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:11.093105078 CET4455050545.143.124.1192.168.2.7
                                            Jan 15, 2025 03:01:11.241548061 CET4455029531.90.249.1192.168.2.7
                                            Jan 15, 2025 03:01:11.241622925 CET50295445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:01:11.252207041 CET50295445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:01:11.252249956 CET50295445192.168.2.731.90.249.1
                                            Jan 15, 2025 03:01:11.258874893 CET4455029531.90.249.1192.168.2.7
                                            Jan 15, 2025 03:01:11.258892059 CET4455029531.90.249.1192.168.2.7
                                            Jan 15, 2025 03:01:12.695770979 CET44550309137.97.46.1192.168.2.7
                                            Jan 15, 2025 03:01:12.696046114 CET50309445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:01:12.711322069 CET44550308147.122.230.1192.168.2.7
                                            Jan 15, 2025 03:01:12.711391926 CET50308445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:01:12.725078106 CET44550311213.65.203.2192.168.2.7
                                            Jan 15, 2025 03:01:12.725132942 CET50311445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:01:13.495568037 CET50333445192.168.2.7130.135.246.2
                                            Jan 15, 2025 03:01:13.495599031 CET50324445192.168.2.721.98.72.2
                                            Jan 15, 2025 03:01:13.495713949 CET50374445192.168.2.7137.90.115.2
                                            Jan 15, 2025 03:01:13.495814085 CET50430445192.168.2.7139.72.231.2
                                            Jan 15, 2025 03:01:13.495846033 CET50308445192.168.2.7147.122.230.1
                                            Jan 15, 2025 03:01:13.495846033 CET50362445192.168.2.779.119.108.2
                                            Jan 15, 2025 03:01:13.495846033 CET50309445192.168.2.7137.97.46.1
                                            Jan 15, 2025 03:01:13.495865107 CET50311445192.168.2.7213.65.203.2
                                            Jan 15, 2025 03:01:13.495887995 CET50318445192.168.2.764.205.237.1
                                            Jan 15, 2025 03:01:13.495930910 CET50319445192.168.2.7179.41.181.1
                                            Jan 15, 2025 03:01:13.495964050 CET50322445192.168.2.7158.149.209.1
                                            Jan 15, 2025 03:01:13.495997906 CET50355445192.168.2.729.25.90.2
                                            Jan 15, 2025 03:01:13.496001005 CET50327445192.168.2.791.64.225.1
                                            Jan 15, 2025 03:01:13.495997906 CET50342445192.168.2.782.67.136.2
                                            Jan 15, 2025 03:01:13.496020079 CET50328445192.168.2.733.25.92.1
                                            Jan 15, 2025 03:01:13.496047974 CET50331445192.168.2.735.213.56.1
                                            Jan 15, 2025 03:01:13.496068001 CET50336445192.168.2.7190.102.160.1
                                            Jan 15, 2025 03:01:13.496126890 CET50340445192.168.2.7162.96.189.1
                                            Jan 15, 2025 03:01:13.496136904 CET50345445192.168.2.7128.245.153.1
                                            Jan 15, 2025 03:01:13.496166945 CET50346445192.168.2.7210.248.16.1
                                            Jan 15, 2025 03:01:13.496184111 CET50349445192.168.2.7165.128.219.1
                                            Jan 15, 2025 03:01:13.496218920 CET50353445192.168.2.733.182.69.1
                                            Jan 15, 2025 03:01:13.496258974 CET50406445192.168.2.725.91.69.1
                                            Jan 15, 2025 03:01:13.496275902 CET50366445192.168.2.739.160.83.1
                                            Jan 15, 2025 03:01:13.496304035 CET50382445192.168.2.749.107.0.1
                                            Jan 15, 2025 03:01:13.496318102 CET50337445192.168.2.752.82.147.1
                                            Jan 15, 2025 03:01:13.496318102 CET50357445192.168.2.768.9.245.1
                                            Jan 15, 2025 03:01:13.496324062 CET50397445192.168.2.7128.6.201.2
                                            Jan 15, 2025 03:01:13.496381044 CET50505445192.168.2.745.143.124.1
                                            Jan 15, 2025 03:01:13.496483088 CET50486445192.168.2.7101.99.113.2
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 15, 2025 03:00:05.247282028 CET123123192.168.2.7104.40.149.189
                                            Jan 15, 2025 03:00:05.778661966 CET123123104.40.149.189192.168.2.7
                                            Jan 15, 2025 03:00:07.365139008 CET5306653192.168.2.71.1.1.1
                                            Jan 15, 2025 03:00:07.375052929 CET53530661.1.1.1192.168.2.7
                                            Jan 15, 2025 03:00:59.511852980 CET138138192.168.2.7192.168.2.255
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 15, 2025 03:00:07.365139008 CET192.168.2.71.1.1.10x1c91Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 15, 2025 03:00:07.375052929 CET1.1.1.1192.168.2.70x1c91No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                            Jan 15, 2025 03:00:07.375052929 CET1.1.1.1192.168.2.70x1c91No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.749710104.16.167.228807448C:\Windows\mssecsvc.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 03:00:07.387568951 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 03:00:07.884793997 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 02:00:07 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 90224538bf2b5e7f-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.749711104.16.167.228807580C:\Windows\mssecsvc.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 03:00:08.045598030 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 03:00:08.511749983 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 02:00:08 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 9022453cce3ec459-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.749738104.16.167.228807724C:\Windows\mssecsvc.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 03:00:09.475254059 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 03:00:09.942291975 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 02:00:09 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 90224545bfd8729f-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:21:00:05
                                            Start date:14/01/2025
                                            Path:C:\Windows\System32\loaddll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll"
                                            Imagebase:0x60000
                                            File size:126'464 bytes
                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:21:00:05
                                            Start date:14/01/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:21:00:05
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1
                                            Imagebase:0x410000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:21:00:05
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\FAuEwllF3K.dll,PlayGame
                                            Imagebase:0xe10000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:21:00:05
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",#1
                                            Imagebase:0xe10000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:21:00:06
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvc.exe
                                            Imagebase:0x400000
                                            File size:3'723'264 bytes
                                            MD5 hash:41B5BA4BF74E65845FA8C9861CA34508
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1339964370.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1340112507.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1340112507.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:21:00:07
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                            Imagebase:0x400000
                                            File size:3'723'264 bytes
                                            MD5 hash:41B5BA4BF74E65845FA8C9861CA34508
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1353214577.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1353379067.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1353379067.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1998422277.0000000001EBA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1998422277.0000000001EBA000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1998695528.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1998695528.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:9
                                            Start time:21:00:08
                                            Start date:14/01/2025
                                            Path:C:\Windows\tasksche.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\WINDOWS\tasksche.exe /i
                                            Imagebase:0x400000
                                            File size:3'514'368 bytes
                                            MD5 hash:C906087FBFE90924BC4F903E527E52E8
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1360227847.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 93%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:21:00:08
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\FAuEwllF3K.dll",PlayGame
                                            Imagebase:0xe10000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:11
                                            Start time:21:00:08
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvc.exe
                                            Imagebase:0x400000
                                            File size:3'723'264 bytes
                                            MD5 hash:41B5BA4BF74E65845FA8C9861CA34508
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1375184941.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1366991636.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1367125832.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1367125832.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1375316014.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1375316014.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:12
                                            Start time:21:00:09
                                            Start date:14/01/2025
                                            Path:C:\Windows\tasksche.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\WINDOWS\tasksche.exe /i
                                            Imagebase:0x400000
                                            File size:3'514'368 bytes
                                            MD5 hash:C906087FBFE90924BC4F903E527E52E8
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1374745759.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1374272040.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:71.8%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:64.9%
                                              Total number of Nodes:37
                                              Total number of Limit Nodes:9

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                              • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                              • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                              • CreateProcessA.KERNELBASE ref: 00407EE8
                                              • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                              • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1361201526.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1361162084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361267814.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361401779.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4281112323-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1361201526.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1361162084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361267814.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361401779.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1361201526.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1361162084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361267814.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361401779.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                              • API String ID: 774561529-2942426231
                                              • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                              • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1361201526.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1361162084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361267814.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361401779.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                              • API String ID: 3340711343-4063779371
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1361201526.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1361162084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361267814.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361329805.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361401779.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1361508490.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.0
                                              • API String ID: 4274534310-3729025388
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Execution Graph

                                              Execution Coverage:34.9%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:35
                                              Total number of Limit Nodes:2

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.1997259291.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.1997239283.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997279893.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997406014.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997429326.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.0
                                              • API String ID: 4274534310-3729025388
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.1997259291.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.1997239283.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997279893.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997406014.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997429326.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                              • API String ID: 774561529-2942426231
                                              • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                              • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.1997259291.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.1997239283.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997279893.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997406014.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997429326.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                              • API String ID: 3340711343-4063779371
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.1997259291.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.1997239283.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997279893.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997406014.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997429326.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4072214828-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.1997259291.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.1997239283.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997279893.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997307520.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997378700.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997406014.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997429326.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.1997526852.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                              APIs
                                              • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memcpy
                                              • String ID: /../$/..\$\../$\..\
                                              • API String ID: 3510742995-3885502717
                                              • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                              • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                              • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                              • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                              APIs
                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                              • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                              • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                              • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                              • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                              • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                              • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                              • API String ID: 2238633743-2459060434
                                              • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                              • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                              • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                              • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                              APIs
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                              • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                              • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                              • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$ManagerStart
                                              • String ID: cmd.exe /c "%s"
                                              • API String ID: 1485051382-955883872
                                              • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                              • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                              • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                              • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                              • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                              • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrow$memcpy
                                              • String ID:
                                              • API String ID: 1881450474-3916222277
                                              • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                              • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                              • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                              • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                              APIs
                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                              • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                              • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                              • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                              • String ID: WANACRY!
                                              • API String ID: 283026544-1240840912
                                              • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                              • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                              • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                              • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                              • String ID: $Q;@
                                              • API String ID: 2382887404-262343263
                                              • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                              • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                              • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                              • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                              • String ID:
                                              • API String ID: 2382887404-3916222277
                                              • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                              • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                              • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                              • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                              APIs
                                              • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$FreeProcessfree
                                              • String ID:
                                              • API String ID: 3428986607-0
                                              • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                              • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                              • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                              • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrow
                                              • String ID:
                                              • API String ID: 941485209-0
                                              • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                              • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                              • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                              • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrow
                                              • String ID:
                                              • API String ID: 941485209-0
                                              • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                              • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                              • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                              • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memcpy
                                              • String ID:
                                              • API String ID: 3510742995-0
                                              • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                              • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                              • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                              • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                              APIs
                                              • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ContextCryptRelease
                                              • String ID:
                                              • API String ID: 829835001-0
                                              • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                              • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                              • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                              • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                              • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                              • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                              • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                              • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                              • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                              • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                              APIs
                                                • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                              • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                              • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                              • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                              • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                              • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                              • API String ID: 2238633743-1294736154
                                              • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                              • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                              • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                              • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: %s%s$%s%s%s$:$\
                                              • API String ID: 0-1100577047
                                              • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                              • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                              • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                              • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                              APIs
                                              • __p___argv.MSVCRT(0040F538), ref: 00402040
                                              • strcmp.MSVCRT(?), ref: 0040204B
                                              • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                              • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                              • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                              • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                              • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                                • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                              • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                              • API String ID: 1074704982-2844324180
                                              • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                              • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                              • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                              • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                              APIs
                                              • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                              • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                              • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                              • strlen.MSVCRT(?), ref: 004011A7
                                              • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                              • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                              • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                              • String ID: 0@$Software\$WanaCrypt0r
                                              • API String ID: 865909632-3421300005
                                              • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                              • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                              • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                              • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                              • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                              • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                              • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                              • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                              • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                              • String ID: %s\Intel$%s\ProgramData
                                              • API String ID: 3806094219-198707228
                                              • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                              • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                              • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                              • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                              APIs
                                                • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                              • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                              • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                              • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                                • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                              • SetLastError.KERNEL32(0000045A), ref: 00402430
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                              • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                              • API String ID: 1900561814-3657104962
                                              • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                              • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                              • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                              • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                              APIs
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                              • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                              • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                              • String ID: %s\%s
                                              • API String ID: 1036847564-4073750446
                                              • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                              • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                              • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                              • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                              APIs
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                              • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                              • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                              • CloseHandle.KERNEL32(?), ref: 004010EC
                                              • CloseHandle.KERNEL32(?), ref: 004010F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                              • String ID: D
                                              • API String ID: 786732093-2746444292
                                              • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                              • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                              • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                              • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                              APIs
                                              • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                              • __p__fmode.MSVCRT ref: 004077FC
                                              • __p__commode.MSVCRT ref: 0040780A
                                              • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                              • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                              • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                              • String ID:
                                              • API String ID: 3626615345-0
                                              • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                              • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                              • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                              • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                              APIs
                                              • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                              • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                              • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                              • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                              • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                              • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                              • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                              • String ID:
                                              • API String ID: 2141228402-0
                                              • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                              • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                              • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                              • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                              APIs
                                              • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                              • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                              • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Read$realloc
                                              • String ID: ?!@
                                              • API String ID: 1241503663-708128716
                                              • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                              • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                              • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                              • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: rand$wcslen$ComputerNamesrand
                                              • String ID:
                                              • API String ID: 3058258771-0
                                              • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                              • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                              • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                              • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                              APIs
                                              • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                              • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                              • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                              • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                              • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                              • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                              • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                              • String ID:
                                              • API String ID: 2935503933-0
                                              • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                              • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                              • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                              • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                              APIs
                                              • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                              • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                              • Sleep.KERNEL32(000003E8), ref: 00401F40
                                              • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandleMutexOpenSleepsprintf
                                              • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                              • API String ID: 2780352083-2959021817
                                              • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                              • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                              • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                              • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                              • String ID:
                                              • API String ID: 2382887404-0
                                              • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                              • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                              • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                              • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                              APIs
                                              • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                              • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                              • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                              • fclose.MSVCRT(00000000), ref: 00401058
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: fclosefopenfreadfwrite
                                              • String ID: c.wnry
                                              • API String ID: 4000964834-3240288721
                                              • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                              • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                              • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                              • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                              APIs
                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                              • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                              • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                              • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                              • String ID:
                                              • API String ID: 2811923685-0
                                              • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                              • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                              • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                              • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                              APIs
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                              • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Pointer$??2@Create
                                              • String ID:
                                              • API String ID: 1331958074-0
                                              • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                              • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                              • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                              • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                              APIs
                                              • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                              • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast_stricmp
                                              • String ID: P!@
                                              • API String ID: 1278613211-1774101457
                                              • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                              • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                              • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                              • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                              APIs
                                              • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                              • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AttributesFilestrcmp
                                              • String ID: c.wnry
                                              • API String ID: 3324900478-3240288721
                                              • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                              • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                              • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                              • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                              APIs
                                              • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??3@CloseHandle
                                              • String ID: $l@
                                              • API String ID: 3816424416-2140230165
                                              • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                              • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                              • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                              • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                              • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                              • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                              • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.1360688659.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000009.00000002.1360656575.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360707599.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360747075.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000009.00000002.1360767986.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CriticalSection$Leave$Entermemcpy
                                              • String ID:
                                              • API String ID: 3435569088-0
                                              • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                              • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                              • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                              • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65