Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XB6SkLK7Al.dll

Overview

General Information

Sample name:XB6SkLK7Al.dll
renamed because original name is a hash value
Original sample name:508a10e644641d0663201a34d1f34a3e.dll
Analysis ID:1591532
MD5:508a10e644641d0663201a34d1f34a3e
SHA1:938032b48266a294ac966a632bf39510112ee052
SHA256:5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • svchost.exe (PID: 7544 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • loaddll32.exe (PID: 7604 cmdline: loaddll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7680 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7708 cmdline: rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7772 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1147EA38FA9C8262147EDFCA8D05C25B)
          • tasksche.exe (PID: 7904 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 8DB30A1308D4B53A26A76B814813B8B4)
    • rundll32.exe (PID: 7692 cmdline: rundll32.exe C:\Users\user\Desktop\XB6SkLK7Al.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7972 cmdline: rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7992 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1147EA38FA9C8262147EDFCA8D05C25B)
        • tasksche.exe (PID: 8064 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 8DB30A1308D4B53A26A76B814813B8B4)
  • mssecsvc.exe (PID: 7828 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 1147EA38FA9C8262147EDFCA8D05C25B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
XB6SkLK7Al.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    XB6SkLK7Al.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    XB6SkLK7Al.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0000000B.00000000.1347851747.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000008.00000000.1327271311.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000009.00000000.1335587362.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.23d38c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvc.exe.1ead084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              7.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                7.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                7.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 135 entries

                System Summary

                barindex
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, ProcessId: 7544, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:49.962352+010020315153Misc activity104.16.167.22880192.168.2.749708TCP
                2025-01-15T03:04:50.710698+010020315153Misc activity104.16.167.22880192.168.2.749714TCP
                2025-01-15T03:04:52.703188+010020315153Misc activity104.16.167.22880192.168.2.749746TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:49.470331+010020242911A Network Trojan was detected192.168.2.7559251.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:43.674532+010020242981A Network Trojan was detected192.168.2.750608104.16.167.22880TCP
                2025-01-15T03:04:49.961647+010020242981A Network Trojan was detected192.168.2.749708104.16.167.22880TCP
                2025-01-15T03:04:50.710490+010020242981A Network Trojan was detected192.168.2.749714104.16.167.22880TCP
                2025-01-15T03:04:52.698305+010020242981A Network Trojan was detected192.168.2.749746104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:43.674532+010020242991A Network Trojan was detected192.168.2.750608104.16.167.22880TCP
                2025-01-15T03:04:49.961647+010020242991A Network Trojan was detected192.168.2.749708104.16.167.22880TCP
                2025-01-15T03:04:50.710490+010020242991A Network Trojan was detected192.168.2.749714104.16.167.22880TCP
                2025-01-15T03:04:52.698305+010020242991A Network Trojan was detected192.168.2.749746104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:43.674532+010020243011A Network Trojan was detected192.168.2.750608104.16.167.22880TCP
                2025-01-15T03:04:49.961647+010020243011A Network Trojan was detected192.168.2.749708104.16.167.22880TCP
                2025-01-15T03:04:50.710490+010020243011A Network Trojan was detected192.168.2.749714104.16.167.22880TCP
                2025-01-15T03:04:52.698305+010020243011A Network Trojan was detected192.168.2.749746104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:43.674532+010020243021A Network Trojan was detected192.168.2.750608104.16.167.22880TCP
                2025-01-15T03:04:49.961647+010020243021A Network Trojan was detected192.168.2.749708104.16.167.22880TCP
                2025-01-15T03:04:50.710490+010020243021A Network Trojan was detected192.168.2.749714104.16.167.22880TCP
                2025-01-15T03:04:52.698305+010020243021A Network Trojan was detected192.168.2.749746104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:43.674532+010028033043Unknown Traffic192.168.2.750608104.16.167.22880TCP
                2025-01-15T03:04:49.961647+010028033043Unknown Traffic192.168.2.749708104.16.167.22880TCP
                2025-01-15T03:04:50.710490+010028033043Unknown Traffic192.168.2.749714104.16.167.22880TCP
                2025-01-15T03:04:52.698305+010028033043Unknown Traffic192.168.2.749746104.16.167.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: XB6SkLK7Al.dllAvira: detected
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 92%
                Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 96%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 92%
                Source: XB6SkLK7Al.dllReversingLabs: Detection: 94%
                Source: XB6SkLK7Al.dllVirustotal: Detection: 92%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                Source: XB6SkLK7Al.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: XB6SkLK7Al.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49708 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49708 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49708 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49708 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49746 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49746 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49746 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49746 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:50608 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:50608 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:50608 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:50608 -> 104.16.167.228:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:04:49 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90224c1bd83a7d24-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:04:50 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90224c208fa443af-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:04:52 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90224c2cec7e43a7-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.7:55925 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49708 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49714 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49746 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49714
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49708
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49746
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:50608 -> 104.16.167.228:80
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.56
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.56
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.56
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.56
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 175.234.135.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.221
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.221
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.221
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.221
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 126.209.43.1
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.133
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.133
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.133
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.133
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 130.239.216.1
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 106.205.70.86
                Source: unknownTCP traffic detected without corresponding DNS query: 106.205.70.86
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: time.windows.com
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com(
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.1337101922.0000000000DAE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1977868941.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1356931274.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1356931274.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                Source: mssecsvc.exe, 0000000B.00000002.1356931274.0000000000AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/&
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                Source: mssecsvc.exe, 0000000B.00000002.1356931274.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/?
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/b
                Source: mssecsvc.exe, 0000000B.00000002.1356931274.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ll$#)
                Source: mssecsvc.exe, 00000008.00000002.1973190181.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comM
                Source: mssecsvc.exe, 0000000B.00000002.1356931274.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.come#j
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
                Source: Yara matchFile source: XB6SkLK7Al.dll, type: SAMPLE
                Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23d38c8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb80a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23e2948.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebc104.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23de8e8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000000.1347851747.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1327271311.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1356546521.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.1320365186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.1320229087.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1978555635.0000000001EBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1979072584.00000000023E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1356686800.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1327451613.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1347997698.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7772, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7828, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7992, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                System Summary

                barindex
                Source: XB6SkLK7Al.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: XB6SkLK7Al.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23d38c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ead084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23d38c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23d38c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1eb80a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb80a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23e2948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e2948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ebc104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ebc104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23de8e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23de8e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.1335587362.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.1355576538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000007.00000000.1320365186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.1356116098.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.1978555635.0000000001EBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.1979072584.00000000023E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.1356686800.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1327451613.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.1347997698.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
                Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: tasksche.exe.7.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: XB6SkLK7Al.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: XB6SkLK7Al.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: XB6SkLK7Al.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23d38c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ead084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1edf128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.240596c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.23e2948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1edf128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1ebc104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23d38c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23d38c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1eb80a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb80a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.240596c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ead084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23e2948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e2948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ebc104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ebc104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23de8e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23de8e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.1335587362.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.1355576538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000007.00000000.1320365186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.1356116098.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.1978555635.0000000001EBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.1979072584.00000000023E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.1356686800.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1327451613.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.1347997698.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: tasksche.exe, 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000000.1355576538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, XB6SkLK7Al.dll, tasksche.exe.7.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@21/3@2/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 7_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,7_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 7_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7612:120:WilError_03
                Source: XB6SkLK7Al.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\XB6SkLK7Al.dll,PlayGame
                Source: XB6SkLK7Al.dllReversingLabs: Detection: 94%
                Source: XB6SkLK7Al.dllVirustotal: Detection: 92%
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\XB6SkLK7Al.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\XB6SkLK7Al.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: XB6SkLK7Al.dllStatic file information: File size 5267459 > 1048576
                Source: XB6SkLK7Al.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
                Source: C:\Windows\mssecsvc.exeCode function: 7_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7876Thread sleep count: 94 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7876Thread sleep time: -188000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7880Thread sleep count: 125 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7880Thread sleep count: 39 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7876Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.1337101922.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1977868941.0000000000C4E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1977868941.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1356931274.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1356931274.0000000000AEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvc.exe, 00000007.00000002.1337101922.0000000000DD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW"f
                Source: svchost.exe, 00000000.00000002.2566219501.000001BA0F22B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1Jump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                14
                Windows Service
                14
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media11
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS2
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591532 Sample: XB6SkLK7Al.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 49 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->49 51 time.windows.com 2->51 59 Tries to download HTTP data from a sinkholed server 2->59 61 Suricata IDS alerts for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 6 other signatures 2->65 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        16 svchost.exe 2->16         started        signatures3 process4 dnsIp5 18 cmd.exe 1 10->18         started        20 rundll32.exe 10->20         started        23 rundll32.exe 1 10->23         started        26 conhost.exe 10->26         started        53 192.168.2.102 unknown unknown 12->53 55 192.168.2.103 unknown unknown 12->55 57 98 other IPs or domains 12->57 83 Connects to many different private IPs via SMB (likely to spread or exploit) 12->83 85 Connects to many different private IPs (likely to spread or exploit) 12->85 signatures6 process7 file8 28 rundll32.exe 18->28         started        73 Drops executables to the windows directory (C:\Windows) and starts them 20->73 30 mssecsvc.exe 7 20->30         started        45 C:\Windows\mssecsvc.exe, PE32 23->45 dropped signatures9 process10 file11 34 mssecsvc.exe 7 28->34         started        47 C:\WINDOWS\qeriuwjhrf (copy), PE32 30->47 dropped 87 Drops executables to the windows directory (C:\Windows) and starts them 30->87 38 tasksche.exe 30->38         started        signatures12 process13 file14 43 C:\Windows\tasksche.exe, PE32 34->43 dropped 67 Antivirus detection for dropped file 34->67 69 Multi AV Scanner detection for dropped file 34->69 71 Machine Learning detection for dropped file 34->71 40 tasksche.exe 34->40         started        signatures15 process16 signatures17 75 Detected Wannacry Ransomware 40->75 77 Antivirus detection for dropped file 40->77 79 Multi AV Scanner detection for dropped file 40->79 81 Machine Learning detection for dropped file 40->81

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                XB6SkLK7Al.dll95%ReversingLabsWin32.Ransomware.WannaCry
                XB6SkLK7Al.dll93%VirustotalBrowse
                XB6SkLK7Al.dll100%AviraTR/Ransom.Gen
                XB6SkLK7Al.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\mssecsvc.exe97%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com(0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.come#j0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comM0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                104.16.167.228
                truefalse
                  high
                  time.windows.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.4.drfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/bmssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comMmssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/?mssecsvc.exe, 0000000B.00000002.1356931274.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ll$#)mssecsvc.exe, 0000000B.00000002.1356931274.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.come#jmssecsvc.exe, 0000000B.00000002.1356931274.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/&mssecsvc.exe, 0000000B.00000002.1356931274.0000000000AEF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com(mssecsvc.exe, 00000007.00000002.1337101922.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.1973190181.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    163.115.239.1
                                    unknownFrance
                                    17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                                    126.209.43.221
                                    unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                    50.32.17.1
                                    unknownUnited States
                                    5650FRONTIER-FRTRUSfalse
                                    155.118.5.83
                                    unknownUnited States
                                    11003PANDGUSfalse
                                    62.58.226.1
                                    unknownBelgium
                                    13127VERSATELASfortheTrans-EuropeanTele2IPTransportbackbofalse
                                    62.58.226.2
                                    unknownBelgium
                                    13127VERSATELASfortheTrans-EuropeanTele2IPTransportbackbofalse
                                    207.254.166.1
                                    unknownUnited States
                                    16717CRAWKANINTERNETUSfalse
                                    3.121.114.254
                                    unknownUnited States
                                    16509AMAZON-02USfalse
                                    206.120.66.120
                                    unknownUnited States
                                    701UUNETUSfalse
                                    111.166.229.40
                                    unknownChina
                                    4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                    51.199.76.1
                                    unknownUnited Kingdom
                                    5607BSKYB-BROADBAND-ASGBfalse
                                    200.93.139.50
                                    unknownColombia
                                    19429ETB-ColombiaCOfalse
                                    90.18.104.1
                                    unknownFrance
                                    3215FranceTelecom-OrangeFRfalse
                                    62.58.226.14
                                    unknownBelgium
                                    13127VERSATELASfortheTrans-EuropeanTele2IPTransportbackbofalse
                                    146.29.208.1
                                    unknownUnited States
                                    197938TRAVIANGAMESDEfalse
                                    35.129.230.250
                                    unknownUnited States
                                    20115CHARTER-20115USfalse
                                    47.70.157.78
                                    unknownUnited States
                                    3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                    200.78.55.1
                                    unknownMexico
                                    8151UninetSAdeCVMXfalse
                                    220.145.173.1
                                    unknownJapan2510INFOWEBFUJITSULIMITEDJPfalse
                                    169.237.19.1
                                    unknownUnited States
                                    6192UCDAVIS-COREUSfalse
                                    33.141.206.1
                                    unknownUnited States
                                    2686ATGS-MMD-ASUSfalse
                                    IP
                                    10.95.214.2
                                    10.95.214.1
                                    192.168.2.148
                                    192.168.2.149
                                    192.168.2.146
                                    192.168.2.147
                                    192.168.2.140
                                    192.168.2.141
                                    192.168.2.144
                                    192.168.2.145
                                    192.168.2.142
                                    192.168.2.143
                                    192.168.2.159
                                    192.168.2.157
                                    192.168.2.158
                                    192.168.2.151
                                    192.168.2.152
                                    192.168.2.150
                                    192.168.2.155
                                    192.168.2.156
                                    192.168.2.153
                                    192.168.2.154
                                    192.168.2.126
                                    192.168.2.247
                                    192.168.2.127
                                    192.168.2.248
                                    192.168.2.124
                                    192.168.2.245
                                    192.168.2.125
                                    192.168.2.246
                                    192.168.2.128
                                    192.168.2.249
                                    192.168.2.129
                                    192.168.2.240
                                    192.168.2.122
                                    192.168.2.243
                                    192.168.2.123
                                    192.168.2.244
                                    192.168.2.120
                                    192.168.2.241
                                    192.168.2.121
                                    192.168.2.242
                                    192.168.2.97
                                    192.168.2.137
                                    192.168.2.96
                                    192.168.2.138
                                    192.168.2.99
                                    192.168.2.135
                                    192.168.2.98
                                    192.168.2.136
                                    192.168.2.139
                                    192.168.2.250
                                    192.168.2.130
                                    192.168.2.251
                                    192.168.2.91
                                    192.168.2.90
                                    192.168.2.93
                                    192.168.2.133
                                    192.168.2.254
                                    192.168.2.92
                                    192.168.2.134
                                    192.168.2.95
                                    192.168.2.131
                                    192.168.2.252
                                    192.168.2.94
                                    192.168.2.132
                                    192.168.2.253
                                    192.168.2.104
                                    192.168.2.225
                                    192.168.2.105
                                    192.168.2.226
                                    192.168.2.102
                                    192.168.2.223
                                    192.168.2.103
                                    192.168.2.224
                                    192.168.2.108
                                    192.168.2.229
                                    192.168.2.109
                                    192.168.2.106
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1591532
                                    Start date and time:2025-01-15 03:03:45 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 45s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:17
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:XB6SkLK7Al.dll
                                    renamed because original name is a hash value
                                    Original Sample Name:508a10e644641d0663201a34d1f34a3e.dll
                                    Detection:MAL
                                    Classification:mal100.rans.expl.evad.winDLL@21/3@2/100
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .dll
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 104.40.149.189, 199.232.210.172, 13.107.246.45, 4.245.163.56
                                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target tasksche.exe, PID 7904 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    21:04:51API Interceptor1x Sleep call for process: loaddll32.exe modified
                                    23:02:15API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    FRONTIER-FRTRUSue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                    • 172.76.144.71
                                    04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                    • 100.32.218.1
                                    sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                    • 50.121.163.1
                                    meth3.elfGet hashmaliciousMiraiBrowse
                                    • 47.179.43.208
                                    arm5.elfGet hashmaliciousUnknownBrowse
                                    • 50.121.138.201
                                    meth5.elfGet hashmaliciousMiraiBrowse
                                    • 172.78.20.239
                                    meth6.elfGet hashmaliciousMiraiBrowse
                                    • 71.110.132.117
                                    arm7.elfGet hashmaliciousMiraiBrowse
                                    • 47.154.153.200
                                    elitebotnet.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 172.78.197.147
                                    6.elfGet hashmaliciousUnknownBrowse
                                    • 66.15.225.203
                                    PANDGUShttp://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                    • 137.184.77.2
                                    meth3.elfGet hashmaliciousMiraiBrowse
                                    • 143.32.228.148
                                    i686.elfGet hashmaliciousUnknownBrowse
                                    • 137.185.194.244
                                    x86_64.elfGet hashmaliciousUnknownBrowse
                                    • 151.222.72.149
                                    meth14.elfGet hashmaliciousMiraiBrowse
                                    • 143.11.186.154
                                    mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 143.5.192.221
                                    elitebotnet.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 155.125.62.62
                                    elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 143.31.4.23
                                    4.elfGet hashmaliciousUnknownBrowse
                                    • 155.127.8.25
                                    res.mips.elfGet hashmaliciousUnknownBrowse
                                    • 143.38.163.139
                                    GIGAINFRASoftbankBBCorpJPhVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                    • 219.202.225.135
                                    9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                    • 60.154.229.1
                                    04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                    • 126.128.51.225
                                    sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                    • 219.56.238.1
                                    YZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                                    • 126.46.181.1
                                    eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                    • 126.147.175.1
                                    sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                    • 126.245.156.111
                                    MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                    • 126.245.102.34
                                    Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                    • 219.174.245.132
                                    meth10.elfGet hashmaliciousMiraiBrowse
                                    • 60.132.41.97
                                    CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovi9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                    • 112.91.195.1
                                    v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                    • 163.112.40.1
                                    ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                    • 221.5.28.201
                                    mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                    • 27.44.253.1
                                    Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                    • 163.102.11.158
                                    meth3.elfGet hashmaliciousMiraiBrowse
                                    • 163.94.54.127
                                    meth1.elfGet hashmaliciousMiraiBrowse
                                    • 27.41.222.152
                                    x86_64.elfGet hashmaliciousUnknownBrowse
                                    • 163.71.17.81
                                    meth2.elfGet hashmaliciousMiraiBrowse
                                    • 157.148.153.54
                                    mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 163.106.22.17
                                    No context
                                    No context
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):7.43213113628182
                                    Encrypted:false
                                    SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEa593R8yAVp2Hj:QqPe1Cxcxk3ZAEazR8yc4Hj
                                    MD5:8DB30A1308D4B53A26A76B814813B8B4
                                    SHA1:61791A7326AF11EF6BBE3007DEC1D43D172EDD8B
                                    SHA-256:CED6E1AB61223C75546BC6C10ABFDF75419A8092A7803789817052D48DDF0714
                                    SHA-512:1BBD5CCB904AECA6DC9EB42D6F75925175CBBC13CED43F6D4BF999FCEFB56D033C5E27BFD13EFB493E76EC50AA8B01E6CC07F53102F83411B32C6C29CF269750
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 93%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3723264
                                    Entropy (8bit):7.395221864317515
                                    Encrypted:false
                                    SSDEEP:98304:XDqPoBhz1aRxcSUDk36SAEa593R8yAVp2HI:XDqPe1Cxcxk3ZAEazR8yc4HI
                                    MD5:1147EA38FA9C8262147EDFCA8D05C25B
                                    SHA1:C269024FFF089B2DF3939B934CA8EE75CC40D6B7
                                    SHA-256:0A9EC2F6C2C9ACF8B0D69E4478951DDFADFC2F7208A564EBFAE9D28738C51E5F
                                    SHA-512:F26FC6D40D5976CF7163CCA2255F1D56D623CDB58D4A6DF40B112B210CD128624D0D5947723C15152C57E109EA5E5332AE2EDB037A843C9D4B2882FA844F2086
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 97%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):7.43213113628182
                                    Encrypted:false
                                    SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEa593R8yAVp2Hj:QqPe1Cxcxk3ZAEazR8yc4Hj
                                    MD5:8DB30A1308D4B53A26A76B814813B8B4
                                    SHA1:61791A7326AF11EF6BBE3007DEC1D43D172EDD8B
                                    SHA-256:CED6E1AB61223C75546BC6C10ABFDF75419A8092A7803789817052D48DDF0714
                                    SHA-512:1BBD5CCB904AECA6DC9EB42D6F75925175CBBC13CED43F6D4BF999FCEFB56D033C5E27BFD13EFB493E76EC50AA8B01E6CC07F53102F83411B32C6C29CF269750
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 93%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):5.766509993181367
                                    TrID:
                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                    • DOS Executable Generic (2002/1) 0.20%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:XB6SkLK7Al.dll
                                    File size:5'267'459 bytes
                                    MD5:508a10e644641d0663201a34d1f34a3e
                                    SHA1:938032b48266a294ac966a632bf39510112ee052
                                    SHA256:5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197
                                    SHA512:c7bff89cca236eec09f8c736f8bed56c0b17314397053b610c29e274c97b660b725a847dd622f306c1ac3bf7d91b0baceb078664270ae7da522b9fde9dd6a24b
                                    SSDEEP:98304:TDqPoBhz1aRxcSUDk36SAEa593R8yAVp2H:TDqPe1Cxcxk3ZAEazR8yc4H
                                    TLSH:39363395616CB1FCD0441EB54077496B7BB33C1DA7FA5E0F8BC086AA0D53B9AAFC0A41
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                    Icon Hash:7ae282899bbab082
                                    Entrypoint:0x100011e9
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x10000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                    DLL Characteristics:
                                    Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    push ebx
                                    mov ebx, dword ptr [ebp+08h]
                                    push esi
                                    mov esi, dword ptr [ebp+0Ch]
                                    push edi
                                    mov edi, dword ptr [ebp+10h]
                                    test esi, esi
                                    jne 00007FB558CFEB4Bh
                                    cmp dword ptr [10003140h], 00000000h
                                    jmp 00007FB558CFEB68h
                                    cmp esi, 01h
                                    je 00007FB558CFEB47h
                                    cmp esi, 02h
                                    jne 00007FB558CFEB64h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007FB558CFEB4Bh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    test eax, eax
                                    je 00007FB558CFEB4Eh
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FB558CFEA5Ah
                                    test eax, eax
                                    jne 00007FB558CFEB46h
                                    xor eax, eax
                                    jmp 00007FB558CFEB90h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FB558CFE90Ch
                                    cmp esi, 01h
                                    mov dword ptr [ebp+0Ch], eax
                                    jne 00007FB558CFEB4Eh
                                    test eax, eax
                                    jne 00007FB558CFEB79h
                                    push edi
                                    push eax
                                    push ebx
                                    call 00007FB558CFEA36h
                                    test esi, esi
                                    je 00007FB558CFEB47h
                                    cmp esi, 03h
                                    jne 00007FB558CFEB68h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007FB558CFEA25h
                                    test eax, eax
                                    jne 00007FB558CFEB45h
                                    and dword ptr [ebp+0Ch], eax
                                    cmp dword ptr [ebp+0Ch], 00000000h
                                    je 00007FB558CFEB53h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007FB558CFEB4Ah
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    mov dword ptr [ebp+0Ch], eax
                                    mov eax, dword ptr [ebp+0Ch]
                                    pop edi
                                    pop esi
                                    pop ebx
                                    pop ebp
                                    retn 000Ch
                                    jmp dword ptr [10002028h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    Programming Language:
                                    • [ C ] VS98 (6.0) build 8168
                                    • [C++] VS98 (6.0) build 8168
                                    • [RES] VS98 (6.0) cvtres build 1720
                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x40000x5000600x5010006d77d12d95d44a961253cded3f9dbe1cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    W0x40600x500000dataEnglishUnited States0.8770942687988281
                                    DLLImport
                                    KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                    MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                    NameOrdinalAddress
                                    PlayGame10x10001114
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-15T03:04:43.674532+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.750608104.16.167.22880TCP
                                    2025-01-15T03:04:43.674532+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.750608104.16.167.22880TCP
                                    2025-01-15T03:04:43.674532+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.750608104.16.167.22880TCP
                                    2025-01-15T03:04:43.674532+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.750608104.16.167.22880TCP
                                    2025-01-15T03:04:43.674532+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.750608104.16.167.22880TCP
                                    2025-01-15T03:04:49.470331+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.7559251.1.1.153UDP
                                    2025-01-15T03:04:49.961647+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749708104.16.167.22880TCP
                                    2025-01-15T03:04:49.961647+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749708104.16.167.22880TCP
                                    2025-01-15T03:04:49.961647+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749708104.16.167.22880TCP
                                    2025-01-15T03:04:49.961647+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749708104.16.167.22880TCP
                                    2025-01-15T03:04:49.961647+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749708104.16.167.22880TCP
                                    2025-01-15T03:04:49.962352+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749708TCP
                                    2025-01-15T03:04:50.710490+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749714104.16.167.22880TCP
                                    2025-01-15T03:04:50.710490+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749714104.16.167.22880TCP
                                    2025-01-15T03:04:50.710490+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749714104.16.167.22880TCP
                                    2025-01-15T03:04:50.710490+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749714104.16.167.22880TCP
                                    2025-01-15T03:04:50.710490+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749714104.16.167.22880TCP
                                    2025-01-15T03:04:50.710698+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749714TCP
                                    2025-01-15T03:04:52.698305+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749746104.16.167.22880TCP
                                    2025-01-15T03:04:52.698305+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749746104.16.167.22880TCP
                                    2025-01-15T03:04:52.698305+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749746104.16.167.22880TCP
                                    2025-01-15T03:04:52.698305+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749746104.16.167.22880TCP
                                    2025-01-15T03:04:52.698305+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749746104.16.167.22880TCP
                                    2025-01-15T03:04:52.703188+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749746TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 03:04:43.674531937 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:04:43.955447912 CET49674443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:43.955566883 CET49675443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:44.049176931 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:04:44.174195051 CET49672443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:44.471050024 CET49671443192.168.2.7204.79.197.203
                                    Jan 15, 2025 03:04:44.799176931 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:04:46.299329996 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:04:49.283523083 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:04:49.484451056 CET4970880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:49.489197016 CET8049708104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:49.489280939 CET4970880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:49.489938021 CET4970880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:49.494725943 CET8049708104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:49.961570024 CET8049708104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:49.961647034 CET4970880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:49.961805105 CET4970880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:49.962352037 CET8049708104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:49.962423086 CET4970880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:49.966586113 CET8049708104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:50.229667902 CET4971480192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:50.234683037 CET8049714104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:50.234800100 CET4971480192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:50.241573095 CET4971480192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:50.248023987 CET8049714104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:50.710385084 CET8049714104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:50.710489988 CET4971480192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:50.710603952 CET4971480192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:50.710697889 CET8049714104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:50.710793972 CET4971480192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:50.717945099 CET8049714104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:50.764925957 CET49720445192.168.2.7175.234.135.56
                                    Jan 15, 2025 03:04:50.772303104 CET44549720175.234.135.56192.168.2.7
                                    Jan 15, 2025 03:04:50.772378922 CET49720445192.168.2.7175.234.135.56
                                    Jan 15, 2025 03:04:50.773065090 CET49720445192.168.2.7175.234.135.56
                                    Jan 15, 2025 03:04:50.773247957 CET49721445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.780567884 CET44549721175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:04:50.780580997 CET44549720175.234.135.56192.168.2.7
                                    Jan 15, 2025 03:04:50.780620098 CET49721445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.780659914 CET49720445192.168.2.7175.234.135.56
                                    Jan 15, 2025 03:04:50.780719042 CET49721445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.782902002 CET49724445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.788341045 CET44549721175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:04:50.788383961 CET49721445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.790482998 CET44549724175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:04:50.790765047 CET49724445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.790765047 CET49724445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:04:50.795603037 CET44549724175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:04:52.220114946 CET4974680192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:52.224911928 CET8049746104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:52.226737976 CET4974680192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:52.226923943 CET4974680192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:52.231677055 CET8049746104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:52.697653055 CET8049746104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:52.698082924 CET8049746104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:52.698304892 CET4974680192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:52.698304892 CET4974680192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:04:52.703187943 CET8049746104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:04:52.780986071 CET49751445192.168.2.7126.209.43.221
                                    Jan 15, 2025 03:04:52.785887957 CET44549751126.209.43.221192.168.2.7
                                    Jan 15, 2025 03:04:52.785965919 CET49751445192.168.2.7126.209.43.221
                                    Jan 15, 2025 03:04:52.786114931 CET49751445192.168.2.7126.209.43.221
                                    Jan 15, 2025 03:04:52.786216974 CET49752445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.791026115 CET44549751126.209.43.221192.168.2.7
                                    Jan 15, 2025 03:04:52.791038990 CET44549752126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:04:52.791116953 CET49752445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.791146994 CET49751445192.168.2.7126.209.43.221
                                    Jan 15, 2025 03:04:52.791212082 CET49752445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.792490005 CET49753445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.796097994 CET44549752126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:04:52.796152115 CET49752445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.797380924 CET44549753126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:04:52.797488928 CET49753445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.797543049 CET49753445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:04:52.802341938 CET44549753126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:04:53.564793110 CET49674443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:53.564804077 CET49675443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:53.783551931 CET49672443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:54.080432892 CET49671443192.168.2.7204.79.197.203
                                    Jan 15, 2025 03:04:54.884613037 CET49789445192.168.2.7130.239.216.133
                                    Jan 15, 2025 03:04:54.891294956 CET44549789130.239.216.133192.168.2.7
                                    Jan 15, 2025 03:04:54.891375065 CET49789445192.168.2.7130.239.216.133
                                    Jan 15, 2025 03:04:54.891612053 CET49789445192.168.2.7130.239.216.133
                                    Jan 15, 2025 03:04:54.892329931 CET49791445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.899214983 CET44549789130.239.216.133192.168.2.7
                                    Jan 15, 2025 03:04:54.899332047 CET49789445192.168.2.7130.239.216.133
                                    Jan 15, 2025 03:04:54.899564028 CET44549791130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:04:54.899630070 CET49791445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.899945021 CET49791445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.907028913 CET49792445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.907545090 CET44549791130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:04:54.907601118 CET49791445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.914604902 CET44549792130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:04:54.914720058 CET49792445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.914752007 CET49792445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:04:54.922884941 CET44549792130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:04:55.236879110 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:04:56.045890093 CET44349701104.98.116.138192.168.2.7
                                    Jan 15, 2025 03:04:56.046005964 CET49701443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:04:56.879084110 CET49828445192.168.2.710.95.214.89
                                    Jan 15, 2025 03:04:56.883922100 CET4454982810.95.214.89192.168.2.7
                                    Jan 15, 2025 03:04:56.887180090 CET49828445192.168.2.710.95.214.89
                                    Jan 15, 2025 03:04:56.887252092 CET49828445192.168.2.710.95.214.89
                                    Jan 15, 2025 03:04:56.887447119 CET49829445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.892117977 CET4454982810.95.214.89192.168.2.7
                                    Jan 15, 2025 03:04:56.892194033 CET4454982910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:04:56.892252922 CET49828445192.168.2.710.95.214.89
                                    Jan 15, 2025 03:04:56.892288923 CET49829445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.892384052 CET49829445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.897265911 CET4454982910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:04:56.897357941 CET49829445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.903882980 CET49830445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.908718109 CET4454983010.95.214.1192.168.2.7
                                    Jan 15, 2025 03:04:56.908847094 CET49830445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.908932924 CET49830445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:04:56.913674116 CET4454983010.95.214.1192.168.2.7
                                    Jan 15, 2025 03:04:58.894310951 CET49863445192.168.2.7106.205.70.86
                                    Jan 15, 2025 03:04:58.899159908 CET44549863106.205.70.86192.168.2.7
                                    Jan 15, 2025 03:04:58.899485111 CET49863445192.168.2.7106.205.70.86
                                    Jan 15, 2025 03:04:58.899502993 CET49865445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.899516106 CET49863445192.168.2.7106.205.70.86
                                    Jan 15, 2025 03:04:58.904325962 CET44549865106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:04:58.904434919 CET49865445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.904449940 CET44549863106.205.70.86192.168.2.7
                                    Jan 15, 2025 03:04:58.904469967 CET49865445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.904537916 CET49863445192.168.2.7106.205.70.86
                                    Jan 15, 2025 03:04:58.905309916 CET49866445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.909311056 CET44549865106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:04:58.909382105 CET49865445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.910109997 CET44549866106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:04:58.910206079 CET49866445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.910226107 CET49866445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:04:58.914947033 CET44549866106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:00.909706116 CET49901445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.914598942 CET44549901137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:00.914674997 CET49901445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.914750099 CET49901445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.915043116 CET49902445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.919557095 CET44549901137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:00.919609070 CET49901445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.919847965 CET44549902137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:00.919908047 CET49902445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.919950008 CET49902445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.921183109 CET49904445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.924876928 CET44549902137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:00.924942017 CET49902445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.925921917 CET44549904137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:00.926028013 CET49904445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.926028013 CET49904445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:00.930807114 CET44549904137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:02.924702883 CET49937445192.168.2.762.58.226.14
                                    Jan 15, 2025 03:05:02.929651022 CET4454993762.58.226.14192.168.2.7
                                    Jan 15, 2025 03:05:02.929724932 CET49937445192.168.2.762.58.226.14
                                    Jan 15, 2025 03:05:02.929789066 CET49937445192.168.2.762.58.226.14
                                    Jan 15, 2025 03:05:02.929932117 CET49938445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.934716940 CET4454993762.58.226.14192.168.2.7
                                    Jan 15, 2025 03:05:02.934775114 CET4454993862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:02.934784889 CET49937445192.168.2.762.58.226.14
                                    Jan 15, 2025 03:05:02.934833050 CET49938445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.934887886 CET49938445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.935236931 CET49939445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.939845085 CET4454993862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:02.939909935 CET49938445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.940109968 CET4454993962.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:02.940188885 CET49939445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.940258980 CET49939445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:02.945079088 CET4454993962.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:04.553301096 CET49701443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:05:04.559907913 CET49968443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:05:04.559966087 CET44349968104.98.116.138192.168.2.7
                                    Jan 15, 2025 03:05:04.560028076 CET49968443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:05:04.561052084 CET49968443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:05:04.561067104 CET44349968104.98.116.138192.168.2.7
                                    Jan 15, 2025 03:05:04.575436115 CET44349701104.98.116.138192.168.2.7
                                    Jan 15, 2025 03:05:05.056910992 CET49975445192.168.2.7111.166.229.40
                                    Jan 15, 2025 03:05:05.061757088 CET44549975111.166.229.40192.168.2.7
                                    Jan 15, 2025 03:05:05.061820030 CET49975445192.168.2.7111.166.229.40
                                    Jan 15, 2025 03:05:05.061878920 CET49975445192.168.2.7111.166.229.40
                                    Jan 15, 2025 03:05:05.062006950 CET49977445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.066781044 CET44549977111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:05.066819906 CET44549975111.166.229.40192.168.2.7
                                    Jan 15, 2025 03:05:05.066854000 CET49977445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.066874027 CET49975445192.168.2.7111.166.229.40
                                    Jan 15, 2025 03:05:05.066967010 CET49977445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.067426920 CET49978445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.071830034 CET44549977111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:05.071904898 CET49977445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.072233915 CET44549978111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:05.072290897 CET49978445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.072345972 CET49978445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:05.077148914 CET44549978111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:07.049818039 CET50016445192.168.2.735.129.230.250
                                    Jan 15, 2025 03:05:07.054626942 CET4455001635.129.230.250192.168.2.7
                                    Jan 15, 2025 03:05:07.054774046 CET50016445192.168.2.735.129.230.250
                                    Jan 15, 2025 03:05:07.054852962 CET50016445192.168.2.735.129.230.250
                                    Jan 15, 2025 03:05:07.054996014 CET50017445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.059756994 CET4455001735.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:07.059767008 CET4455001635.129.230.250192.168.2.7
                                    Jan 15, 2025 03:05:07.059874058 CET50017445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.059915066 CET50017445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.060146093 CET50016445192.168.2.735.129.230.250
                                    Jan 15, 2025 03:05:07.061213970 CET50018445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.064872026 CET4455001735.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:07.064934015 CET50017445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.065980911 CET4455001835.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:07.066060066 CET50018445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.066082001 CET50018445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:07.070895910 CET4455001835.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:07.142996073 CET49677443192.168.2.720.50.201.200
                                    Jan 15, 2025 03:05:09.065325975 CET50051445192.168.2.7138.100.165.24
                                    Jan 15, 2025 03:05:09.070252895 CET44550051138.100.165.24192.168.2.7
                                    Jan 15, 2025 03:05:09.070332050 CET50051445192.168.2.7138.100.165.24
                                    Jan 15, 2025 03:05:09.070354939 CET50051445192.168.2.7138.100.165.24
                                    Jan 15, 2025 03:05:09.070502996 CET50052445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.075303078 CET44550051138.100.165.24192.168.2.7
                                    Jan 15, 2025 03:05:09.075362921 CET50051445192.168.2.7138.100.165.24
                                    Jan 15, 2025 03:05:09.075385094 CET44550052138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:09.075449944 CET50052445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.075465918 CET50052445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.075709105 CET50053445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.080425024 CET44550052138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:09.080508947 CET50052445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.080576897 CET44550053138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:09.080688953 CET50053445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.080704927 CET50053445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:09.085572004 CET44550053138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:11.092626095 CET50088445192.168.2.747.70.157.78
                                    Jan 15, 2025 03:05:11.098681927 CET4455008847.70.157.78192.168.2.7
                                    Jan 15, 2025 03:05:11.099193096 CET50088445192.168.2.747.70.157.78
                                    Jan 15, 2025 03:05:11.124262094 CET50088445192.168.2.747.70.157.78
                                    Jan 15, 2025 03:05:11.124459028 CET50090445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.129242897 CET4455008847.70.157.78192.168.2.7
                                    Jan 15, 2025 03:05:11.129331112 CET50088445192.168.2.747.70.157.78
                                    Jan 15, 2025 03:05:11.129393101 CET4455009047.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:11.129666090 CET50090445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.129750013 CET50090445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.130064964 CET50091445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.134777069 CET4455009047.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:11.134922028 CET4455009147.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:11.134926081 CET50090445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.135000944 CET50091445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.135068893 CET50091445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:11.139918089 CET4455009147.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:12.155693054 CET44549724175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:12.155774117 CET49724445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:12.155889034 CET49724445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:12.155998945 CET49724445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:12.160722017 CET44549724175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:12.160820007 CET44549724175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:13.096561909 CET50123445192.168.2.7165.240.21.191
                                    Jan 15, 2025 03:05:13.101397038 CET44550123165.240.21.191192.168.2.7
                                    Jan 15, 2025 03:05:13.101476908 CET50123445192.168.2.7165.240.21.191
                                    Jan 15, 2025 03:05:13.101526976 CET50123445192.168.2.7165.240.21.191
                                    Jan 15, 2025 03:05:13.101747036 CET50124445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.106491089 CET44550123165.240.21.191192.168.2.7
                                    Jan 15, 2025 03:05:13.106542110 CET50123445192.168.2.7165.240.21.191
                                    Jan 15, 2025 03:05:13.106560946 CET44550124165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:13.106853962 CET50124445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.106853962 CET50124445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.107109070 CET50125445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.111923933 CET44550125165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:13.112032890 CET44550124165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:13.112061977 CET50125445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.112097025 CET50124445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.112123013 CET50125445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:13.116899967 CET44550125165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:14.151782990 CET44549753126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:14.151849031 CET49753445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:14.151896954 CET49753445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:14.151966095 CET49753445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:14.157144070 CET44549753126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:14.157152891 CET44549753126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:15.112255096 CET50163445192.168.2.7206.120.66.120
                                    Jan 15, 2025 03:05:15.117027998 CET44550163206.120.66.120192.168.2.7
                                    Jan 15, 2025 03:05:15.117206097 CET50163445192.168.2.7206.120.66.120
                                    Jan 15, 2025 03:05:15.117207050 CET50163445192.168.2.7206.120.66.120
                                    Jan 15, 2025 03:05:15.117487907 CET50164445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.122220039 CET44550164206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:15.122284889 CET50164445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.122303963 CET44550163206.120.66.120192.168.2.7
                                    Jan 15, 2025 03:05:15.122333050 CET50164445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.122587919 CET50163445192.168.2.7206.120.66.120
                                    Jan 15, 2025 03:05:15.122678041 CET50165445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.127211094 CET44550164206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:15.127281904 CET50164445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.127438068 CET44550165206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:15.127595901 CET50165445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.127595901 CET50165445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:15.132450104 CET44550165206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:15.159020901 CET50167445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:15.164011955 CET44550167175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:15.164105892 CET50167445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:15.164179087 CET50167445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:15.168929100 CET44550167175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:16.294047117 CET44549792130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:16.294106960 CET49792445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:16.301151991 CET49792445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:16.301314116 CET49792445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:16.307104111 CET44549792130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:16.307746887 CET44549792130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:17.127995968 CET50181445192.168.2.790.18.104.130
                                    Jan 15, 2025 03:05:17.133824110 CET4455018190.18.104.130192.168.2.7
                                    Jan 15, 2025 03:05:17.133948088 CET50181445192.168.2.790.18.104.130
                                    Jan 15, 2025 03:05:17.134013891 CET50181445192.168.2.790.18.104.130
                                    Jan 15, 2025 03:05:17.134227037 CET50182445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.139050007 CET4455018290.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:17.139108896 CET50182445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.139141083 CET50182445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.139419079 CET50184445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.141685009 CET4455018190.18.104.130192.168.2.7
                                    Jan 15, 2025 03:05:17.141748905 CET50181445192.168.2.790.18.104.130
                                    Jan 15, 2025 03:05:17.144753933 CET4455018490.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:17.144840956 CET50184445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.144901991 CET50184445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.147069931 CET4455018290.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:17.147135019 CET50182445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:17.149669886 CET4455018490.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:17.158963919 CET50186445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:17.163773060 CET44550186126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:17.163871050 CET50186445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:17.163919926 CET50186445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:17.168703079 CET44550186126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:18.324367046 CET4454983010.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:18.324424982 CET49830445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:18.324484110 CET49830445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:18.324552059 CET49830445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:18.329214096 CET4454983010.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:18.329313040 CET4454983010.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:19.143914938 CET50198445192.168.2.73.121.114.254
                                    Jan 15, 2025 03:05:19.148864985 CET445501983.121.114.254192.168.2.7
                                    Jan 15, 2025 03:05:19.148972034 CET50198445192.168.2.73.121.114.254
                                    Jan 15, 2025 03:05:19.149058104 CET50198445192.168.2.73.121.114.254
                                    Jan 15, 2025 03:05:19.149199963 CET50199445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.154033899 CET445501993.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:19.154146910 CET50199445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.154150963 CET445501983.121.114.254192.168.2.7
                                    Jan 15, 2025 03:05:19.154160976 CET50199445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.154196024 CET50198445192.168.2.73.121.114.254
                                    Jan 15, 2025 03:05:19.154536963 CET50200445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.159123898 CET445501993.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:19.159197092 CET50199445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.159395933 CET445502003.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:19.159502029 CET50200445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.159560919 CET50200445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:19.164359093 CET445502003.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:19.315468073 CET50201445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:19.320238113 CET44550201130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:19.320322990 CET50201445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:19.320524931 CET50201445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:19.325541019 CET44550201130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:20.312519073 CET44549866106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:20.312598944 CET49866445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:20.312653065 CET49866445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:20.312738895 CET49866445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:20.317580938 CET44549866106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:20.317610979 CET44549866106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:21.159189939 CET50216445192.168.2.781.119.66.168
                                    Jan 15, 2025 03:05:21.164159060 CET4455021681.119.66.168192.168.2.7
                                    Jan 15, 2025 03:05:21.164258003 CET50216445192.168.2.781.119.66.168
                                    Jan 15, 2025 03:05:21.164299011 CET50216445192.168.2.781.119.66.168
                                    Jan 15, 2025 03:05:21.164511919 CET50217445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.170064926 CET4455021681.119.66.168192.168.2.7
                                    Jan 15, 2025 03:05:21.170099974 CET4455021781.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:21.170136929 CET50216445192.168.2.781.119.66.168
                                    Jan 15, 2025 03:05:21.170178890 CET50217445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.170269966 CET50217445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.170624971 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.175892115 CET4455021781.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:21.175955057 CET50217445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.176201105 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:21.176278114 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.176327944 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:21.181718111 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:21.330918074 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:21.337955952 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:21.338052988 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:21.338115931 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:21.345187902 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:22.324096918 CET44549904137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:22.324151039 CET49904445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:22.324209929 CET49904445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:22.324295998 CET49904445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:22.328969002 CET44549904137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:22.329102039 CET44549904137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:23.176215887 CET50231445192.168.2.7138.204.168.224
                                    Jan 15, 2025 03:05:23.181196928 CET44550231138.204.168.224192.168.2.7
                                    Jan 15, 2025 03:05:23.181320906 CET50231445192.168.2.7138.204.168.224
                                    Jan 15, 2025 03:05:23.181363106 CET50231445192.168.2.7138.204.168.224
                                    Jan 15, 2025 03:05:23.181467056 CET50232445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.187347889 CET44550232138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:23.187427044 CET50232445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.187455893 CET50232445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.187635899 CET44550231138.204.168.224192.168.2.7
                                    Jan 15, 2025 03:05:23.187690973 CET50231445192.168.2.7138.204.168.224
                                    Jan 15, 2025 03:05:23.187771082 CET50233445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.193567991 CET44550233138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:23.193578005 CET44550232138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:23.193648100 CET50232445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.193656921 CET50233445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.193716049 CET50233445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:23.199163914 CET44550233138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:23.315732956 CET50238445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:23.323746920 CET44550238106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:23.323839903 CET50238445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:23.323911905 CET50238445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:23.330493927 CET44550238106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:24.311933994 CET4454993962.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:24.312030077 CET49939445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:24.312077999 CET49939445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:24.312124968 CET49939445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:24.319168091 CET4454993962.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:24.319179058 CET4454993962.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:25.190596104 CET50249445192.168.2.7155.118.5.83
                                    Jan 15, 2025 03:05:25.195549965 CET44550249155.118.5.83192.168.2.7
                                    Jan 15, 2025 03:05:25.199215889 CET50249445192.168.2.7155.118.5.83
                                    Jan 15, 2025 03:05:25.199295044 CET50249445192.168.2.7155.118.5.83
                                    Jan 15, 2025 03:05:25.199435949 CET50250445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.204260111 CET44550249155.118.5.83192.168.2.7
                                    Jan 15, 2025 03:05:25.204343081 CET44550250155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:25.204401970 CET50249445192.168.2.7155.118.5.83
                                    Jan 15, 2025 03:05:25.204459906 CET50250445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.204520941 CET50250445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.204792976 CET50252445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.209450960 CET44550250155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:25.209995031 CET44550252155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:25.210067987 CET50250445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.210094929 CET50252445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.213342905 CET50252445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:25.220035076 CET44550252155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:25.331054926 CET50253445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:25.335958958 CET44550253137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:25.336049080 CET50253445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:25.336245060 CET50253445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:25.341130972 CET44550253137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:26.433871984 CET44549978111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:26.433965921 CET49978445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:26.469702005 CET49978445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:26.469702005 CET49978445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:26.476176977 CET44549978111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:26.476192951 CET44549978111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:27.065413952 CET50264445192.168.2.7169.237.19.241
                                    Jan 15, 2025 03:05:27.070375919 CET44550264169.237.19.241192.168.2.7
                                    Jan 15, 2025 03:05:27.070441961 CET50264445192.168.2.7169.237.19.241
                                    Jan 15, 2025 03:05:27.070537090 CET50264445192.168.2.7169.237.19.241
                                    Jan 15, 2025 03:05:27.070682049 CET50265445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.075356960 CET44550264169.237.19.241192.168.2.7
                                    Jan 15, 2025 03:05:27.075397968 CET50264445192.168.2.7169.237.19.241
                                    Jan 15, 2025 03:05:27.076010942 CET44550265169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:27.076065063 CET50265445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.076102018 CET50265445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.076437950 CET50266445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.080990076 CET44550265169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:27.081033945 CET50265445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.081244946 CET44550266169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:27.081319094 CET50266445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.081355095 CET50266445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:27.086096048 CET44550266169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:27.315247059 CET50268445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:27.322355032 CET4455026862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:27.322484970 CET50268445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:27.322515965 CET50268445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:27.328952074 CET4455026862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:28.417593956 CET4455001835.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:28.417726040 CET50018445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:28.417726040 CET50018445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:28.417778969 CET50018445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:28.422591925 CET4455001835.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:28.422604084 CET4455001835.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:28.815583944 CET50279445192.168.2.7220.145.173.154
                                    Jan 15, 2025 03:05:28.820374966 CET44550279220.145.173.154192.168.2.7
                                    Jan 15, 2025 03:05:28.820517063 CET50279445192.168.2.7220.145.173.154
                                    Jan 15, 2025 03:05:28.820559025 CET50279445192.168.2.7220.145.173.154
                                    Jan 15, 2025 03:05:28.820785046 CET50280445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.825407982 CET44550279220.145.173.154192.168.2.7
                                    Jan 15, 2025 03:05:28.825480938 CET50279445192.168.2.7220.145.173.154
                                    Jan 15, 2025 03:05:28.825541019 CET44550280220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:28.825593948 CET50280445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.825627089 CET50280445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.825995922 CET50281445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.830579042 CET44550280220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:28.830636978 CET50280445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.830816031 CET44550281220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:28.830868006 CET50281445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.830900908 CET50281445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:28.835623980 CET44550281220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:29.476986885 CET50286445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:29.481810093 CET44550286111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:29.481878996 CET50286445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:29.481914997 CET50286445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:29.486694098 CET44550286111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:30.456042051 CET50292445192.168.2.7163.115.239.142
                                    Jan 15, 2025 03:05:30.460922956 CET44550292163.115.239.142192.168.2.7
                                    Jan 15, 2025 03:05:30.461064100 CET50292445192.168.2.7163.115.239.142
                                    Jan 15, 2025 03:05:30.461117029 CET50292445192.168.2.7163.115.239.142
                                    Jan 15, 2025 03:05:30.461327076 CET50293445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.466078043 CET44550292163.115.239.142192.168.2.7
                                    Jan 15, 2025 03:05:30.466097116 CET44550293163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:30.466145992 CET50292445192.168.2.7163.115.239.142
                                    Jan 15, 2025 03:05:30.466169119 CET50293445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.466233015 CET44550053138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:30.466274977 CET50293445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.466279984 CET50053445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:30.466384888 CET50053445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:30.466404915 CET50053445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:30.466603994 CET50294445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.471081972 CET44550293163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:30.471132040 CET50293445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.471148968 CET44550053138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:30.471159935 CET44550053138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:30.471441984 CET44550294163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:30.471530914 CET50294445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.471550941 CET50294445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:30.476382017 CET44550294163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:31.424588919 CET50302445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:31.429374933 CET4455030235.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:31.429444075 CET50302445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:31.429491043 CET50302445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:31.434221983 CET4455030235.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:31.987637997 CET50305445192.168.2.733.141.206.245
                                    Jan 15, 2025 03:05:31.992567062 CET4455030533.141.206.245192.168.2.7
                                    Jan 15, 2025 03:05:31.992774010 CET50305445192.168.2.733.141.206.245
                                    Jan 15, 2025 03:05:31.992872000 CET50305445192.168.2.733.141.206.245
                                    Jan 15, 2025 03:05:31.993037939 CET50306445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:31.997858047 CET4455030633.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:31.997927904 CET50306445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:31.997952938 CET4455030533.141.206.245192.168.2.7
                                    Jan 15, 2025 03:05:31.997975111 CET50306445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:31.998034000 CET50305445192.168.2.733.141.206.245
                                    Jan 15, 2025 03:05:31.998398066 CET50307445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:32.002954960 CET4455030633.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:32.003015041 CET50306445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:32.003154993 CET4455030733.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:32.003221989 CET50307445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:32.004635096 CET50307445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:32.009340048 CET4455030733.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:32.548448086 CET4455009147.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:32.548518896 CET50091445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:32.548583984 CET50091445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:32.548583984 CET50091445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:32.553364992 CET4455009147.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:32.553376913 CET4455009147.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:33.409439087 CET50308445192.168.2.7200.93.139.50
                                    Jan 15, 2025 03:05:33.416552067 CET44550308200.93.139.50192.168.2.7
                                    Jan 15, 2025 03:05:33.416654110 CET50308445192.168.2.7200.93.139.50
                                    Jan 15, 2025 03:05:33.416733027 CET50308445192.168.2.7200.93.139.50
                                    Jan 15, 2025 03:05:33.416968107 CET50309445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.423929930 CET44550308200.93.139.50192.168.2.7
                                    Jan 15, 2025 03:05:33.423985958 CET50308445192.168.2.7200.93.139.50
                                    Jan 15, 2025 03:05:33.424283981 CET44550309200.93.139.1192.168.2.7
                                    Jan 15, 2025 03:05:33.424396038 CET50309445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.424432039 CET50309445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.424724102 CET50310445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.429279089 CET44550309200.93.139.1192.168.2.7
                                    Jan 15, 2025 03:05:33.429331064 CET50309445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.429550886 CET44550310200.93.139.1192.168.2.7
                                    Jan 15, 2025 03:05:33.429692984 CET50310445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.429728031 CET50310445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:33.434490919 CET44550310200.93.139.1192.168.2.7
                                    Jan 15, 2025 03:05:33.471415043 CET50311445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:33.476320982 CET44550311138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:33.477906942 CET50311445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:33.477960110 CET50311445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:33.482717991 CET44550311138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:34.495830059 CET44550125165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:34.495934010 CET50125445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:34.495968103 CET50125445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:34.496009111 CET50125445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:34.502468109 CET44550125165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:34.503741980 CET44550125165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:34.741285086 CET50312445192.168.2.750.32.17.103
                                    Jan 15, 2025 03:05:34.746232033 CET4455031250.32.17.103192.168.2.7
                                    Jan 15, 2025 03:05:34.746342897 CET50312445192.168.2.750.32.17.103
                                    Jan 15, 2025 03:05:34.791436911 CET50312445192.168.2.750.32.17.103
                                    Jan 15, 2025 03:05:34.791623116 CET50313445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.796444893 CET4455031250.32.17.103192.168.2.7
                                    Jan 15, 2025 03:05:34.796495914 CET4455031350.32.17.1192.168.2.7
                                    Jan 15, 2025 03:05:34.796533108 CET50312445192.168.2.750.32.17.103
                                    Jan 15, 2025 03:05:34.796561003 CET50313445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.796627045 CET50313445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.796911955 CET50314445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.801475048 CET4455031350.32.17.1192.168.2.7
                                    Jan 15, 2025 03:05:34.801543951 CET50313445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.801843882 CET4455031450.32.17.1192.168.2.7
                                    Jan 15, 2025 03:05:34.801995039 CET50314445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.802067041 CET50314445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:34.806857109 CET4455031450.32.17.1192.168.2.7
                                    Jan 15, 2025 03:05:35.549565077 CET50315445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:35.554445028 CET4455031547.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:35.554516077 CET50315445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:35.554552078 CET50315445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:35.559362888 CET4455031547.70.157.1192.168.2.7
                                    Jan 15, 2025 03:05:35.987596989 CET50316445192.168.2.7158.144.34.239
                                    Jan 15, 2025 03:05:35.992583036 CET44550316158.144.34.239192.168.2.7
                                    Jan 15, 2025 03:05:35.992791891 CET50316445192.168.2.7158.144.34.239
                                    Jan 15, 2025 03:05:35.992827892 CET50316445192.168.2.7158.144.34.239
                                    Jan 15, 2025 03:05:35.992990971 CET50317445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:35.997812033 CET44550317158.144.34.1192.168.2.7
                                    Jan 15, 2025 03:05:35.997823954 CET44550316158.144.34.239192.168.2.7
                                    Jan 15, 2025 03:05:35.997914076 CET50316445192.168.2.7158.144.34.239
                                    Jan 15, 2025 03:05:35.998229980 CET50317445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:35.998233080 CET50318445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:36.003089905 CET44550318158.144.34.1192.168.2.7
                                    Jan 15, 2025 03:05:36.003169060 CET50318445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:36.003197908 CET50318445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:36.003228903 CET44550317158.144.34.1192.168.2.7
                                    Jan 15, 2025 03:05:36.003285885 CET50317445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:36.008090973 CET44550318158.144.34.1192.168.2.7
                                    Jan 15, 2025 03:05:36.497901917 CET44550165206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:36.497977018 CET50165445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:36.498007059 CET50165445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:36.498040915 CET50165445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:36.502777100 CET44550165206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:36.502795935 CET44550165206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:36.530910969 CET44550167175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:36.531009912 CET50167445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:36.531047106 CET50167445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:36.531116009 CET50167445192.168.2.7175.234.135.1
                                    Jan 15, 2025 03:05:36.535809994 CET44550167175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:36.535959005 CET44550167175.234.135.1192.168.2.7
                                    Jan 15, 2025 03:05:36.596549034 CET50319445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.601475000 CET44550319175.234.135.2192.168.2.7
                                    Jan 15, 2025 03:05:36.601567030 CET50319445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.601629972 CET50319445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.601952076 CET50320445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.606489897 CET44550319175.234.135.2192.168.2.7
                                    Jan 15, 2025 03:05:36.606549025 CET50319445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.606821060 CET44550320175.234.135.2192.168.2.7
                                    Jan 15, 2025 03:05:36.606873989 CET50320445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.606899977 CET50320445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:36.611726046 CET44550320175.234.135.2192.168.2.7
                                    Jan 15, 2025 03:05:37.143712997 CET50321445192.168.2.784.231.72.158
                                    Jan 15, 2025 03:05:37.148500919 CET4455032184.231.72.158192.168.2.7
                                    Jan 15, 2025 03:05:37.151225090 CET50321445192.168.2.784.231.72.158
                                    Jan 15, 2025 03:05:37.151247025 CET50321445192.168.2.784.231.72.158
                                    Jan 15, 2025 03:05:37.151366949 CET50322445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.156137943 CET4455032184.231.72.158192.168.2.7
                                    Jan 15, 2025 03:05:37.156208992 CET4455032284.231.72.1192.168.2.7
                                    Jan 15, 2025 03:05:37.156260967 CET50321445192.168.2.784.231.72.158
                                    Jan 15, 2025 03:05:37.156290054 CET50322445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.156373024 CET50322445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.156601906 CET50323445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.161359072 CET4455032384.231.72.1192.168.2.7
                                    Jan 15, 2025 03:05:37.161406040 CET4455032284.231.72.1192.168.2.7
                                    Jan 15, 2025 03:05:37.161475897 CET50322445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.161525965 CET50323445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.161525965 CET50323445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:37.166348934 CET4455032384.231.72.1192.168.2.7
                                    Jan 15, 2025 03:05:37.502968073 CET50324445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:37.509393930 CET44550324165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:37.509463072 CET50324445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:37.509531975 CET50324445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:37.515968084 CET44550324165.240.21.1192.168.2.7
                                    Jan 15, 2025 03:05:38.221849918 CET50325445192.168.2.7192.195.159.27
                                    Jan 15, 2025 03:05:38.226799965 CET44550325192.195.159.27192.168.2.7
                                    Jan 15, 2025 03:05:38.226912975 CET50325445192.168.2.7192.195.159.27
                                    Jan 15, 2025 03:05:38.226969957 CET50325445192.168.2.7192.195.159.27
                                    Jan 15, 2025 03:05:38.227085114 CET50326445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.231933117 CET44550326192.195.159.1192.168.2.7
                                    Jan 15, 2025 03:05:38.231962919 CET44550325192.195.159.27192.168.2.7
                                    Jan 15, 2025 03:05:38.232042074 CET50325445192.168.2.7192.195.159.27
                                    Jan 15, 2025 03:05:38.232048988 CET50326445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.232147932 CET50326445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.232474089 CET50327445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.237117052 CET44550326192.195.159.1192.168.2.7
                                    Jan 15, 2025 03:05:38.237175941 CET50326445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.237215996 CET44550327192.195.159.1192.168.2.7
                                    Jan 15, 2025 03:05:38.237273932 CET50327445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.237318993 CET50327445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:38.242103100 CET44550327192.195.159.1192.168.2.7
                                    Jan 15, 2025 03:05:38.517237902 CET4455018490.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:38.517360926 CET50184445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:38.517580986 CET50184445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:38.517612934 CET50184445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:38.522361040 CET4455018490.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:38.522370100 CET4455018490.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:38.577852011 CET44550186126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:38.578048944 CET50186445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:38.578217983 CET50186445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:38.578280926 CET50186445192.168.2.7126.209.43.1
                                    Jan 15, 2025 03:05:38.583589077 CET44550186126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:38.583609104 CET44550186126.209.43.1192.168.2.7
                                    Jan 15, 2025 03:05:38.643408060 CET50328445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.648266077 CET44550328126.209.43.2192.168.2.7
                                    Jan 15, 2025 03:05:38.648325920 CET50328445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.648396015 CET50328445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.648711920 CET50329445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.653202057 CET44550328126.209.43.2192.168.2.7
                                    Jan 15, 2025 03:05:38.653254032 CET50328445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.653501034 CET44550329126.209.43.2192.168.2.7
                                    Jan 15, 2025 03:05:38.653619051 CET50329445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.653637886 CET50329445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:38.658340931 CET44550329126.209.43.2192.168.2.7
                                    Jan 15, 2025 03:05:39.237485886 CET50330445192.168.2.7135.75.27.192
                                    Jan 15, 2025 03:05:39.242458105 CET44550330135.75.27.192192.168.2.7
                                    Jan 15, 2025 03:05:39.242645025 CET50330445192.168.2.7135.75.27.192
                                    Jan 15, 2025 03:05:39.242697001 CET50330445192.168.2.7135.75.27.192
                                    Jan 15, 2025 03:05:39.242880106 CET50331445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.247576952 CET44550330135.75.27.192192.168.2.7
                                    Jan 15, 2025 03:05:39.247641087 CET50330445192.168.2.7135.75.27.192
                                    Jan 15, 2025 03:05:39.247704983 CET44550331135.75.27.1192.168.2.7
                                    Jan 15, 2025 03:05:39.247757912 CET50331445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.247796059 CET50331445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.248332024 CET50332445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.252504110 CET44550331135.75.27.1192.168.2.7
                                    Jan 15, 2025 03:05:39.252758026 CET44550331135.75.27.1192.168.2.7
                                    Jan 15, 2025 03:05:39.252801895 CET50331445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.253176928 CET44550332135.75.27.1192.168.2.7
                                    Jan 15, 2025 03:05:39.253241062 CET50332445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.253287077 CET50332445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:39.258004904 CET44550332135.75.27.1192.168.2.7
                                    Jan 15, 2025 03:05:39.503012896 CET50333445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:39.508217096 CET44550333206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:39.508361101 CET50333445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:39.510231972 CET50333445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:39.515041113 CET44550333206.120.66.1192.168.2.7
                                    Jan 15, 2025 03:05:40.176076889 CET50334445192.168.2.751.199.76.174
                                    Jan 15, 2025 03:05:40.181001902 CET4455033451.199.76.174192.168.2.7
                                    Jan 15, 2025 03:05:40.181088924 CET50334445192.168.2.751.199.76.174
                                    Jan 15, 2025 03:05:40.181158066 CET50334445192.168.2.751.199.76.174
                                    Jan 15, 2025 03:05:40.181322098 CET50335445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.186130047 CET4455033551.199.76.1192.168.2.7
                                    Jan 15, 2025 03:05:40.186206102 CET50335445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.186249971 CET50335445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.186336040 CET4455033451.199.76.174192.168.2.7
                                    Jan 15, 2025 03:05:40.186388016 CET50334445192.168.2.751.199.76.174
                                    Jan 15, 2025 03:05:40.186837912 CET50336445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.191173077 CET4455033551.199.76.1192.168.2.7
                                    Jan 15, 2025 03:05:40.191227913 CET50335445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.191668987 CET4455033651.199.76.1192.168.2.7
                                    Jan 15, 2025 03:05:40.191728115 CET50336445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.191767931 CET50336445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:40.196603060 CET4455033651.199.76.1192.168.2.7
                                    Jan 15, 2025 03:05:40.543498039 CET445502003.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:40.543734074 CET50200445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:40.543734074 CET50200445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:40.543735027 CET50200445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:40.548810959 CET445502003.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:40.548820972 CET445502003.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:40.700886965 CET44550201130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:40.701020002 CET50201445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:40.701107979 CET50201445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:40.701185942 CET50201445192.168.2.7130.239.216.1
                                    Jan 15, 2025 03:05:40.706000090 CET44550201130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:40.706015110 CET44550201130.239.216.1192.168.2.7
                                    Jan 15, 2025 03:05:40.752850056 CET50337445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.757707119 CET44550337130.239.216.2192.168.2.7
                                    Jan 15, 2025 03:05:40.757783890 CET50337445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.757819891 CET50337445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.758266926 CET50338445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.762706995 CET44550337130.239.216.2192.168.2.7
                                    Jan 15, 2025 03:05:40.762759924 CET50337445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.763142109 CET44550338130.239.216.2192.168.2.7
                                    Jan 15, 2025 03:05:40.763197899 CET50338445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.763257027 CET50338445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:40.767992973 CET44550338130.239.216.2192.168.2.7
                                    Jan 15, 2025 03:05:41.065679073 CET50339445192.168.2.7146.29.208.239
                                    Jan 15, 2025 03:05:41.070516109 CET44550339146.29.208.239192.168.2.7
                                    Jan 15, 2025 03:05:41.070652008 CET50339445192.168.2.7146.29.208.239
                                    Jan 15, 2025 03:05:41.070715904 CET50340445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.070718050 CET50339445192.168.2.7146.29.208.239
                                    Jan 15, 2025 03:05:41.077441931 CET44550340146.29.208.1192.168.2.7
                                    Jan 15, 2025 03:05:41.077521086 CET50340445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.077522039 CET50340445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.077578068 CET44550339146.29.208.239192.168.2.7
                                    Jan 15, 2025 03:05:41.077630043 CET50339445192.168.2.7146.29.208.239
                                    Jan 15, 2025 03:05:41.077750921 CET50341445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.083838940 CET44550340146.29.208.1192.168.2.7
                                    Jan 15, 2025 03:05:41.083899975 CET50340445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.085273027 CET44550341146.29.208.1192.168.2.7
                                    Jan 15, 2025 03:05:41.085326910 CET50341445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.085372925 CET50341445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:41.091825008 CET44550341146.29.208.1192.168.2.7
                                    Jan 15, 2025 03:05:41.518536091 CET50342445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:41.523860931 CET4455034290.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:41.523973942 CET50342445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:41.524019003 CET50342445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:41.528790951 CET4455034290.18.104.1192.168.2.7
                                    Jan 15, 2025 03:05:41.893784046 CET50343445192.168.2.7207.254.166.183
                                    Jan 15, 2025 03:05:41.900240898 CET44550343207.254.166.183192.168.2.7
                                    Jan 15, 2025 03:05:41.900357008 CET50343445192.168.2.7207.254.166.183
                                    Jan 15, 2025 03:05:41.902678013 CET50343445192.168.2.7207.254.166.183
                                    Jan 15, 2025 03:05:41.902894020 CET50344445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.907485962 CET44550343207.254.166.183192.168.2.7
                                    Jan 15, 2025 03:05:41.907557964 CET50343445192.168.2.7207.254.166.183
                                    Jan 15, 2025 03:05:41.907718897 CET44550344207.254.166.1192.168.2.7
                                    Jan 15, 2025 03:05:41.907790899 CET50344445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.907896996 CET50344445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.908257008 CET50345445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.912780046 CET44550344207.254.166.1192.168.2.7
                                    Jan 15, 2025 03:05:41.912847996 CET50344445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.913017035 CET44550345207.254.166.1192.168.2.7
                                    Jan 15, 2025 03:05:41.913074017 CET50345445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.913094044 CET50345445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:41.918225050 CET44550345207.254.166.1192.168.2.7
                                    Jan 15, 2025 03:05:42.659317017 CET50346445192.168.2.7200.78.55.78
                                    Jan 15, 2025 03:05:43.264586926 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:43.264671087 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.264678955 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:43.264763117 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.264770985 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:43.264813900 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:43.264813900 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:43.264813900 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:43.264826059 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:43.264826059 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:43.264826059 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:43.264826059 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:43.264873028 CET50218445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:43.264915943 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.264949083 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:43.264949083 CET50219445192.168.2.710.95.214.1
                                    Jan 15, 2025 03:05:43.265748978 CET44550346200.78.55.78192.168.2.7
                                    Jan 15, 2025 03:05:43.265857935 CET50346445192.168.2.7200.78.55.78
                                    Jan 15, 2025 03:05:43.265938044 CET50346445192.168.2.7200.78.55.78
                                    Jan 15, 2025 03:05:43.266205072 CET50347445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.273627996 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273637056 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273643970 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273653984 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273665905 CET4455021881.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273808956 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273816109 CET4455021910.95.214.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273849964 CET44550347200.78.55.1192.168.2.7
                                    Jan 15, 2025 03:05:43.273910999 CET50347445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.273962021 CET50347445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.274233103 CET50348445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.276148081 CET44550346200.78.55.78192.168.2.7
                                    Jan 15, 2025 03:05:43.276211977 CET50346445192.168.2.7200.78.55.78
                                    Jan 15, 2025 03:05:43.282000065 CET44550348200.78.55.1192.168.2.7
                                    Jan 15, 2025 03:05:43.282032967 CET44550347200.78.55.1192.168.2.7
                                    Jan 15, 2025 03:05:43.282053947 CET50348445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.282078028 CET50347445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.282118082 CET50348445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:43.290616035 CET44550348200.78.55.1192.168.2.7
                                    Jan 15, 2025 03:05:43.330991983 CET50349445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.335900068 CET4455034910.95.214.2192.168.2.7
                                    Jan 15, 2025 03:05:43.335980892 CET50349445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.336008072 CET50349445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.336360931 CET50350445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.340939045 CET4455034910.95.214.2192.168.2.7
                                    Jan 15, 2025 03:05:43.341034889 CET50349445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.341150045 CET4455035010.95.214.2192.168.2.7
                                    Jan 15, 2025 03:05:43.341214895 CET50350445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.341253996 CET50350445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:43.345978975 CET4455035010.95.214.2192.168.2.7
                                    Jan 15, 2025 03:05:43.549943924 CET50352445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:43.555928946 CET445503523.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:43.556024075 CET50352445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:43.556169033 CET50352445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:43.560918093 CET445503523.121.114.1192.168.2.7
                                    Jan 15, 2025 03:05:44.559365034 CET44550233138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:44.559427977 CET50233445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:44.559462070 CET50233445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:44.559508085 CET50233445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:44.565112114 CET44550233138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:44.565124989 CET44550233138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:44.703073025 CET44550238106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:44.703169107 CET50238445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:44.703258038 CET50238445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:44.703351974 CET50238445192.168.2.7106.205.70.1
                                    Jan 15, 2025 03:05:44.708110094 CET44550238106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:44.708122969 CET44550238106.205.70.1192.168.2.7
                                    Jan 15, 2025 03:05:44.768493891 CET50356445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.773580074 CET44550356106.205.70.2192.168.2.7
                                    Jan 15, 2025 03:05:44.773741007 CET50356445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.773839951 CET50356445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.774188995 CET50357445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.778791904 CET44550356106.205.70.2192.168.2.7
                                    Jan 15, 2025 03:05:44.779017925 CET50356445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.779100895 CET44550357106.205.70.2192.168.2.7
                                    Jan 15, 2025 03:05:44.779153109 CET50357445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.779192924 CET50357445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:44.784040928 CET44550357106.205.70.2192.168.2.7
                                    Jan 15, 2025 03:05:46.269258022 CET50366445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:46.276397943 CET4455036681.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:46.276495934 CET50366445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:46.276639938 CET50366445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:46.283624887 CET4455036681.119.66.1192.168.2.7
                                    Jan 15, 2025 03:05:46.735460043 CET44550252155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:46.735522985 CET50252445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:46.735569954 CET50252445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:46.735624075 CET50252445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:46.741461039 CET44550252155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:46.741489887 CET44550252155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:46.793392897 CET44550253137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:46.793502092 CET50253445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:46.793574095 CET50253445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:46.793585062 CET50253445192.168.2.7137.42.49.1
                                    Jan 15, 2025 03:05:46.801357031 CET44550253137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:46.803155899 CET44550253137.42.49.1192.168.2.7
                                    Jan 15, 2025 03:05:46.846540928 CET50372445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.852647066 CET44550372137.42.49.2192.168.2.7
                                    Jan 15, 2025 03:05:46.852718115 CET50372445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.852775097 CET50372445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.853136063 CET50373445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.859047890 CET44550372137.42.49.2192.168.2.7
                                    Jan 15, 2025 03:05:46.859097004 CET50372445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.859216928 CET44550373137.42.49.2192.168.2.7
                                    Jan 15, 2025 03:05:46.859282970 CET50373445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.859303951 CET50373445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:46.864171028 CET44550373137.42.49.2192.168.2.7
                                    Jan 15, 2025 03:05:47.330082893 CET44349968104.98.116.138192.168.2.7
                                    Jan 15, 2025 03:05:47.330163956 CET49968443192.168.2.7104.98.116.138
                                    Jan 15, 2025 03:05:47.565291882 CET50380445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:47.570210934 CET44550380138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:47.570333004 CET50380445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:47.570385933 CET50380445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:47.575162888 CET44550380138.204.168.1192.168.2.7
                                    Jan 15, 2025 03:05:48.433876038 CET44550266169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:48.433979034 CET50266445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:48.433979034 CET50266445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:48.434029102 CET50266445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:48.438906908 CET44550266169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:48.438936949 CET44550266169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:48.855983019 CET4455026862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:48.856266975 CET50268445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:48.856360912 CET50268445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:48.856420040 CET50268445192.168.2.762.58.226.1
                                    Jan 15, 2025 03:05:48.861465931 CET4455026862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:48.861480951 CET4455026862.58.226.1192.168.2.7
                                    Jan 15, 2025 03:05:48.909360886 CET50394445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.914333105 CET4455039462.58.226.2192.168.2.7
                                    Jan 15, 2025 03:05:48.915304899 CET50394445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.915504932 CET50394445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.915935040 CET50395445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.920432091 CET4455039462.58.226.2192.168.2.7
                                    Jan 15, 2025 03:05:48.920816898 CET4455039562.58.226.2192.168.2.7
                                    Jan 15, 2025 03:05:48.920895100 CET50394445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.920933008 CET50395445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.920967102 CET50395445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:48.925808907 CET4455039562.58.226.2192.168.2.7
                                    Jan 15, 2025 03:05:49.737160921 CET50409445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:49.743627071 CET44550409155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:49.743777037 CET50409445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:49.743814945 CET50409445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:49.748655081 CET44550409155.118.5.1192.168.2.7
                                    Jan 15, 2025 03:05:50.246311903 CET44550281220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:50.246474028 CET50281445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:50.246517897 CET50281445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:50.246570110 CET50281445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:50.251462936 CET44550281220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:50.251571894 CET44550281220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:50.856762886 CET44550286111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:50.856870890 CET50286445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:50.856967926 CET50286445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:50.856969118 CET50286445192.168.2.7111.166.229.1
                                    Jan 15, 2025 03:05:50.861753941 CET44550286111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:50.861763954 CET44550286111.166.229.1192.168.2.7
                                    Jan 15, 2025 03:05:50.909360886 CET50430445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.914210081 CET44550430111.166.229.2192.168.2.7
                                    Jan 15, 2025 03:05:50.914294004 CET50430445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.914341927 CET50430445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.914808989 CET50431445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.919281960 CET44550430111.166.229.2192.168.2.7
                                    Jan 15, 2025 03:05:50.919354916 CET50430445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.919600010 CET44550431111.166.229.2192.168.2.7
                                    Jan 15, 2025 03:05:50.919663906 CET50431445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.919698000 CET50431445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:50.924452066 CET44550431111.166.229.2192.168.2.7
                                    Jan 15, 2025 03:05:51.440398932 CET50445445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:51.445322037 CET44550445169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:51.445432901 CET50445445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:51.447228909 CET50445445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:51.451977015 CET44550445169.237.19.1192.168.2.7
                                    Jan 15, 2025 03:05:51.841970921 CET44550294163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:51.842092991 CET50294445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:51.843971968 CET50294445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:51.843971968 CET50294445192.168.2.7163.115.239.1
                                    Jan 15, 2025 03:05:51.848817110 CET44550294163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:51.848828077 CET44550294163.115.239.1192.168.2.7
                                    Jan 15, 2025 03:05:52.808701992 CET4455030235.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:52.808832884 CET50302445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:52.808906078 CET50302445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:52.809010029 CET50302445192.168.2.735.129.230.1
                                    Jan 15, 2025 03:05:52.813728094 CET4455030235.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:52.813760996 CET4455030235.129.230.1192.168.2.7
                                    Jan 15, 2025 03:05:52.862328053 CET50487445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.867374897 CET4455048735.129.230.2192.168.2.7
                                    Jan 15, 2025 03:05:52.867599010 CET50487445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.867688894 CET50487445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.867933989 CET50488445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.872646093 CET4455048735.129.230.2192.168.2.7
                                    Jan 15, 2025 03:05:52.872684956 CET4455048735.129.230.2192.168.2.7
                                    Jan 15, 2025 03:05:52.872766018 CET50487445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.872828007 CET4455048835.129.230.2192.168.2.7
                                    Jan 15, 2025 03:05:52.872900009 CET50488445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.872944117 CET50488445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:52.877717018 CET4455048835.129.230.2192.168.2.7
                                    Jan 15, 2025 03:05:53.252893925 CET50508445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:53.258254051 CET44550508220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:53.258409023 CET50508445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:53.258450985 CET50508445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:05:53.263350010 CET44550508220.145.173.1192.168.2.7
                                    Jan 15, 2025 03:05:53.374878883 CET4455030733.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:53.374983072 CET50307445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:53.375031948 CET50307445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:53.375288010 CET50307445192.168.2.733.141.206.1
                                    Jan 15, 2025 03:05:53.379832983 CET4455030733.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:53.380055904 CET4455030733.141.206.1192.168.2.7
                                    Jan 15, 2025 03:05:54.777582884 CET44550310200.93.139.1192.168.2.7
                                    Jan 15, 2025 03:05:54.777682066 CET50310445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:54.826164961 CET44550311138.100.165.1192.168.2.7
                                    Jan 15, 2025 03:05:54.826256990 CET50311445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:56.183269024 CET4455031450.32.17.1192.168.2.7
                                    Jan 15, 2025 03:05:56.183419943 CET50314445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:56.323919058 CET50488445192.168.2.735.129.230.2
                                    Jan 15, 2025 03:05:56.324043036 CET50409445192.168.2.7155.118.5.1
                                    Jan 15, 2025 03:05:56.324043036 CET50342445192.168.2.790.18.104.1
                                    Jan 15, 2025 03:05:56.324064016 CET50314445192.168.2.750.32.17.1
                                    Jan 15, 2025 03:05:56.324064016 CET50357445192.168.2.7106.205.70.2
                                    Jan 15, 2025 03:05:56.324086905 CET50348445192.168.2.7200.78.55.1
                                    Jan 15, 2025 03:05:56.324119091 CET50329445192.168.2.7126.209.43.2
                                    Jan 15, 2025 03:05:56.324126959 CET50366445192.168.2.781.119.66.1
                                    Jan 15, 2025 03:05:56.324143887 CET50333445192.168.2.7206.120.66.1
                                    Jan 15, 2025 03:05:56.324172974 CET50431445192.168.2.7111.166.229.2
                                    Jan 15, 2025 03:05:56.324193001 CET50320445192.168.2.7175.234.135.2
                                    Jan 15, 2025 03:05:56.324239016 CET50324445192.168.2.7165.240.21.1
                                    Jan 15, 2025 03:05:56.324249983 CET50323445192.168.2.784.231.72.1
                                    Jan 15, 2025 03:05:56.324304104 CET50373445192.168.2.7137.42.49.2
                                    Jan 15, 2025 03:05:56.324357033 CET50327445192.168.2.7192.195.159.1
                                    Jan 15, 2025 03:05:56.324388981 CET50311445192.168.2.7138.100.165.1
                                    Jan 15, 2025 03:05:56.324415922 CET50310445192.168.2.7200.93.139.1
                                    Jan 15, 2025 03:05:56.324419975 CET50315445192.168.2.747.70.157.1
                                    Jan 15, 2025 03:05:56.324439049 CET50318445192.168.2.7158.144.34.1
                                    Jan 15, 2025 03:05:56.324459076 CET50332445192.168.2.7135.75.27.1
                                    Jan 15, 2025 03:05:56.324485064 CET50336445192.168.2.751.199.76.1
                                    Jan 15, 2025 03:05:56.324505091 CET50338445192.168.2.7130.239.216.2
                                    Jan 15, 2025 03:05:56.324531078 CET50341445192.168.2.7146.29.208.1
                                    Jan 15, 2025 03:05:56.324573994 CET50345445192.168.2.7207.254.166.1
                                    Jan 15, 2025 03:05:56.324584961 CET50350445192.168.2.710.95.214.2
                                    Jan 15, 2025 03:05:56.324589014 CET50352445192.168.2.73.121.114.1
                                    Jan 15, 2025 03:05:56.324625969 CET50380445192.168.2.7138.204.168.1
                                    Jan 15, 2025 03:05:56.324644089 CET50395445192.168.2.762.58.226.2
                                    Jan 15, 2025 03:05:56.324677944 CET50445445192.168.2.7169.237.19.1
                                    Jan 15, 2025 03:05:56.324834108 CET50508445192.168.2.7220.145.173.1
                                    Jan 15, 2025 03:06:56.364037991 CET5060880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:06:56.369096994 CET8050608104.16.167.228192.168.2.7
                                    Jan 15, 2025 03:06:56.369164944 CET5060880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:06:56.369250059 CET5060880192.168.2.7104.16.167.228
                                    Jan 15, 2025 03:06:56.374023914 CET8050608104.16.167.228192.168.2.7
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 03:04:48.480338097 CET5842553192.168.2.71.1.1.1
                                    Jan 15, 2025 03:04:49.470330954 CET5592553192.168.2.71.1.1.1
                                    Jan 15, 2025 03:04:49.479108095 CET53559251.1.1.1192.168.2.7
                                    Jan 15, 2025 03:05:44.165950060 CET138138192.168.2.7192.168.2.255
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 15, 2025 03:04:48.480338097 CET192.168.2.71.1.1.10x61eStandard query (0)time.windows.comA (IP address)IN (0x0001)false
                                    Jan 15, 2025 03:04:49.470330954 CET192.168.2.71.1.1.10xcf00Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 15, 2025 03:04:48.487235069 CET1.1.1.1192.168.2.70x61eNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Jan 15, 2025 03:04:49.479108095 CET1.1.1.1192.168.2.70xcf00No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                    Jan 15, 2025 03:04:49.479108095 CET1.1.1.1192.168.2.70xcf00No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                    • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.749708104.16.167.228807772C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 03:04:49.489938021 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 03:04:49.961570024 CET778INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 02:04:49 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 90224c1bd83a7d24-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.749714104.16.167.228807828C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 03:04:50.241573095 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 03:04:50.710385084 CET778INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 02:04:50 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 90224c208fa443af-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.749746104.16.167.228807992C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 03:04:52.226923943 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 03:04:52.697653055 CET778INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 02:04:52 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 90224c2cec7e43a7-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    3192.168.2.750608104.16.167.22880
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 03:06:56.369250059 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:21:04:47
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                    Imagebase:0x7ff7b4ee0000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:1
                                    Start time:21:04:48
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll"
                                    Imagebase:0xf90000
                                    File size:126'464 bytes
                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:21:04:48
                                    Start date:14/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff75da10000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:21:04:48
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1
                                    Imagebase:0x410000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:21:04:48
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\XB6SkLK7Al.dll,PlayGame
                                    Imagebase:0xe60000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:21:04:48
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",#1
                                    Imagebase:0xe60000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:21:04:48
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:1147EA38FA9C8262147EDFCA8D05C25B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.1320365186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1320365186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.1320229087.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 97%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:8
                                    Start time:21:04:49
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                    Imagebase:0xc60000
                                    File size:3'723'264 bytes
                                    MD5 hash:1147EA38FA9C8262147EDFCA8D05C25B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1327271311.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1978555635.0000000001EBC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1978555635.0000000001EBC000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1979072584.00000000023E2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1979072584.00000000023E2000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1327451613.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1327451613.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:9
                                    Start time:21:04:50
                                    Start date:14/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:8DB30A1308D4B53A26A76B814813B8B4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1335587362.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 93%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:21:04:51
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\XB6SkLK7Al.dll",PlayGame
                                    Imagebase:0xe60000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:21:04:51
                                    Start date:14/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:1147EA38FA9C8262147EDFCA8D05C25B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1347851747.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1356546521.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1356686800.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1356686800.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1347997698.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1347997698.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:12
                                    Start time:21:04:52
                                    Start date:14/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:8DB30A1308D4B53A26A76B814813B8B4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1355576538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1356116098.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:71.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:63.2%
                                      Total number of Nodes:38
                                      Total number of Limit Nodes:9
                                      execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBC0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                      • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                      • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                      • CreateProcessA.KERNELBASE ref: 00407EE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                      • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1336462235.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.1336424281.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336507020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336627434.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4281112323-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1336462235.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.1336424281.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336507020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336627434.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1336462235.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.1336424281.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336507020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336627434.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                      • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBC0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1336462235.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.1336424281.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336507020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336627434.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBC0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1336462235.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.1336424281.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336507020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336554319.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336627434.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.1336715704.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Execution Graph

                                      Execution Coverage:34.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:36
                                      Total number of Limit Nodes:2

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBC0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.1973292559.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.1973263136.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973325237.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976199475.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976239989.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.1973292559.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.1973263136.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973325237.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976199475.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976239989.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                      • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBC0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.1973292559.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.1973263136.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973325237.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976199475.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976239989.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBC0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.1973292559.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.1973263136.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973325237.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976199475.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976239989.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4072214828-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.1973292559.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.1973263136.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973325237.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1973625396.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976058599.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976199475.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976239989.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.1976503738.0000000000950000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                      APIs
                                      • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: /../$/..\$\../$\..\
                                      • API String ID: 3510742995-3885502717
                                      • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                      • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                      • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                      • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                      • API String ID: 2238633743-2459060434
                                      • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                      • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                      APIs
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                      • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$ManagerStart
                                      • String ID: cmd.exe /c "%s"
                                      • API String ID: 1485051382-955883872
                                      • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                      • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                      • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                      • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow$memcpy
                                      • String ID:
                                      • API String ID: 1881450474-3916222277
                                      • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                      • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                      • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                      • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                      • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                      • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                      • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                      • String ID: WANACRY!
                                      • API String ID: 283026544-1240840912
                                      • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                      • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                      • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                      • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID: $Q;@
                                      • API String ID: 2382887404-262343263
                                      • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                      • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                      • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                      • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-3916222277
                                      • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                      • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                      • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                      • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                      APIs
                                      • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                      • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$FreeProcessfree
                                      • String ID:
                                      • API String ID: 3428986607-0
                                      • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                      • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                      • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                      • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                      • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                      • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                      • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                      APIs
                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ContextCryptRelease
                                      • String ID:
                                      • API String ID: 829835001-0
                                      • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                      • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                      • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                      • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                      APIs
                                        • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                      • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                      • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                      • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                      • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                      • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                      • API String ID: 2238633743-1294736154
                                      • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                      • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: %s%s$%s%s%s$:$\
                                      • API String ID: 0-1100577047
                                      • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                      • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                      • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                      • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                      APIs
                                      • __p___argv.MSVCRT(0040F538), ref: 00402040
                                      • strcmp.MSVCRT(?), ref: 0040204B
                                      • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                      • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                        • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                      • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                      • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                      • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                        • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                        • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                        • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                        • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                      • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                      • API String ID: 1074704982-2844324180
                                      • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                      • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                      • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                      • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                      APIs
                                      • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                      • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                      • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                      • strlen.MSVCRT(?), ref: 004011A7
                                      • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                      • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                      • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                      • String ID: 0@$Software\$WanaCrypt0r
                                      • API String ID: 865909632-3421300005
                                      • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                      • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                      • String ID: %s\Intel$%s\ProgramData
                                      • API String ID: 3806094219-198707228
                                      • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                      • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                      APIs
                                        • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                      • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                      • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                      • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                        • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                      • SetLastError.KERNEL32(0000045A), ref: 00402430
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                      • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                      • API String ID: 1900561814-3657104962
                                      • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                      • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                      • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                      • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                      APIs
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                      • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                      • String ID: %s\%s
                                      • API String ID: 1036847564-4073750446
                                      • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                      • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                      APIs
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                      • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                      • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                      • CloseHandle.KERNEL32(?), ref: 004010EC
                                      • CloseHandle.KERNEL32(?), ref: 004010F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                      • String ID: D
                                      • API String ID: 786732093-2746444292
                                      • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                      • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                      APIs
                                      • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                      • __p__fmode.MSVCRT ref: 004077FC
                                      • __p__commode.MSVCRT ref: 0040780A
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                      • String ID:
                                      • API String ID: 3626615345-0
                                      • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                      • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                      • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                      • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                      APIs
                                      • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                        • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                      • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                      • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                      • String ID:
                                      • API String ID: 2141228402-0
                                      • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                      • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                      • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                      • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                      APIs
                                      • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                      • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                      • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Read$realloc
                                      • String ID: ?!@
                                      • API String ID: 1241503663-708128716
                                      • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                      • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: rand$wcslen$ComputerNamesrand
                                      • String ID:
                                      • API String ID: 3058258771-0
                                      • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                      • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                      APIs
                                      • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                      • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                      • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                      • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                      • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                      • String ID:
                                      • API String ID: 2935503933-0
                                      • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                      • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                      • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                      • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                      APIs
                                      • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                      • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                      • Sleep.KERNEL32(000003E8), ref: 00401F40
                                      • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleMutexOpenSleepsprintf
                                      • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                      • API String ID: 2780352083-2959021817
                                      • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                      • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-0
                                      • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                      • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                      • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                      • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                      APIs
                                      • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                      • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                      • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                      • fclose.MSVCRT(00000000), ref: 00401058
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefopenfreadfwrite
                                      • String ID: c.wnry
                                      • API String ID: 4000964834-3240288721
                                      • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                      • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                      • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                      • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                      • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                      • String ID:
                                      • API String ID: 2811923685-0
                                      • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                      • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                      • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                      • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Pointer$??2@Create
                                      • String ID:
                                      • API String ID: 1331958074-0
                                      • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                      • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                      APIs
                                      • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                      • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast_stricmp
                                      • String ID: P!@
                                      • API String ID: 1278613211-1774101457
                                      • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                      • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                      • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                      • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                      APIs
                                      • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                      • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesFilestrcmp
                                      • String ID: c.wnry
                                      • API String ID: 3324900478-3240288721
                                      • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                      • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                      • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                      • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                      APIs
                                      • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                      • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??3@CloseHandle
                                      • String ID: $l@
                                      • API String ID: 3816424416-2140230165
                                      • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                      • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                      • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                      • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                      • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1336000717.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000009.00000002.1335978349.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336022407.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336041657.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000009.00000002.1336061242.0000000000640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalSection$Leave$Entermemcpy
                                      • String ID:
                                      • API String ID: 3435569088-0
                                      • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                      • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                      • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                      • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65