Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wmnq39xe8J.dll

Overview

General Information

Sample name:wmnq39xe8J.dll
renamed because original name is a hash value
Original sample name:bc82dd960fce92fc4b513e882dc1c873.dll
Analysis ID:1591533
MD5:bc82dd960fce92fc4b513e882dc1c873
SHA1:65d63b04ed6376a13dea83eb7937a8d6ec95e278
SHA256:8c1d22bd6ff6abd10f01e97c39cd6455c1abf72e45760050ff1bb5f554f7c5b4
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5712 cmdline: loaddll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4300 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4424 cmdline: rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 4568 cmdline: C:\WINDOWS\mssecsvc.exe MD5: E676BB073144D631575F56DF2FAE4CE8)
          • tasksche.exe (PID: 4524 cmdline: C:\WINDOWS\tasksche.exe /i MD5: CE950EA6E27D1637EF799EDA580C8073)
    • rundll32.exe (PID: 5924 cmdline: rundll32.exe C:\Users\user\Desktop\wmnq39xe8J.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6508 cmdline: rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 3776 cmdline: C:\WINDOWS\mssecsvc.exe MD5: E676BB073144D631575F56DF2FAE4CE8)
        • tasksche.exe (PID: 1152 cmdline: C:\WINDOWS\tasksche.exe /i MD5: CE950EA6E27D1637EF799EDA580C8073)
  • mssecsvc.exe (PID: 6704 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: E676BB073144D631575F56DF2FAE4CE8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
wmnq39xe8J.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    wmnq39xe8J.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    wmnq39xe8J.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            00000009.00000000.1486209534.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            0000000B.00000000.1490992989.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.1ea7084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvc.exe.23d88c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              6.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                6.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                6.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 135 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:10.268072+010020315153Misc activity104.16.167.22880192.168.2.849705TCP
                2025-01-15T03:00:11.270936+010020315153Misc activity104.16.167.22880192.168.2.849706TCP
                2025-01-15T03:00:12.778191+010020315153Misc activity104.16.167.22880192.168.2.849723TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:09.737533+010020242911A Network Trojan was detected192.168.2.8566501.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:10.266516+010020242981A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-15T03:00:11.270652+010020242981A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
                2025-01-15T03:00:12.777089+010020242981A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:10.266516+010020242991A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-15T03:00:11.270652+010020242991A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
                2025-01-15T03:00:12.777089+010020242991A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:10.266516+010020243011A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-15T03:00:11.270652+010020243011A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
                2025-01-15T03:00:12.777089+010020243011A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:10.266516+010020243021A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
                2025-01-15T03:00:11.270652+010020243021A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
                2025-01-15T03:00:12.777089+010020243021A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:00:10.266516+010028033043Unknown Traffic192.168.2.849705104.16.167.22880TCP
                2025-01-15T03:00:11.270652+010028033043Unknown Traffic192.168.2.849706104.16.167.22880TCP
                2025-01-15T03:00:12.777089+010028033043Unknown Traffic192.168.2.849723104.16.167.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: wmnq39xe8J.dllAvira: detected
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 92%
                Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 95%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 92%
                Source: wmnq39xe8J.dllReversingLabs: Detection: 94%
                Source: wmnq39xe8J.dllVirustotal: Detection: 90%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                Source: wmnq39xe8J.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: wmnq39xe8J.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49706 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49706 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49706 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49706 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49723 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49723 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49723 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49723 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:10 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902245478f93c35f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:11 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022454e0b8cc34b-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:12 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902245576fc70f88-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:56650 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49706 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49705 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49723 -> 104.16.167.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49706
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49723
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49705
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.207
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.207
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.207
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.207
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 18.65.28.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.34
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.34
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.34
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.34
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 88.189.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.51
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.51
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.51
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.51
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 48.132.234.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.197
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.197
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.197
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.197
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.88.214.1
                Source: unknownTCP traffic detected without corresponding DNS query: 57.106.150.138
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe, 00000006.00000002.1488102985.0000000000AFE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1488102985.0000000000B41000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2126492774.0000000000CFC000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1502610125.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2(xc
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8xS
                Source: mssecsvc.exe, 00000006.00000002.1488102985.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/FD
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Hy
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Xy
                Source: mssecsvc.exe, 00000006.00000002.1488102985.0000000000B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Y
                Source: mssecsvc.exe, 00000008.00000002.2126492774.0000000000CFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hX0
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hz
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com4#g
                Source: mssecsvc.exe, 00000008.00000002.2125977779.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                Source: mssecsvc.exe, 00000006.00000002.1488102985.0000000000B5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
                Source: Yara matchFile source: wmnq39xe8J.dll, type: SAMPLE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb6104.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23e38e8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.23e7948.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb20a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1490992989.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1502106074.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2126929660.0000000001EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1491258408.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1478922170.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1463529134.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2127224243.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1478402314.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1502245261.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4568, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6704, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3776, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                System Summary

                barindex
                Source: wmnq39xe8J.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: wmnq39xe8J.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ea7084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23d88c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1eb6104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb6104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23e38e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e38e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.23e7948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.23e7948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1eb20a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1eb20a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.1486209534.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2126929660.0000000001EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.1491258408.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.1501621099.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1478922170.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2127224243.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.1500941741.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.1502245261.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
                Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: wmnq39xe8J.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: wmnq39xe8J.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: wmnq39xe8J.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ea7084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23d88c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ed9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.23e7948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1eb6104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ed9128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1ea7084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1eb6104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb6104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23e38e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e38e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.23e7948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.23e7948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1eb20a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1eb20a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.1486209534.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2126929660.0000000001EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.1491258408.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.1501621099.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1478922170.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2127224243.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.1500941741.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.1502245261.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: tasksche.exe, 00000009.00000000.1486209534.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.1501621099.000000000040E000.00000008.00000001.01000000.00000007.sdmp, wmnq39xe8J.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1364:120:WilError_03
                Source: wmnq39xe8J.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wmnq39xe8J.dll,PlayGame
                Source: wmnq39xe8J.dllReversingLabs: Detection: 94%
                Source: wmnq39xe8J.dllVirustotal: Detection: 90%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wmnq39xe8J.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wmnq39xe8J.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: wmnq39xe8J.dllStatic file information: File size 5267459 > 1048576
                Source: wmnq39xe8J.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 1892Thread sleep count: 91 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 1892Thread sleep time: -182000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5436Thread sleep count: 126 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 5436Thread sleep count: 46 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 1892Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 00000006.00000002.1488102985.0000000000AFE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1488102985.0000000000B5D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2126492774.0000000000D20000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2126492774.0000000000CD8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvc.exe, 0000000B.00000002.1502610125.0000000000C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1Jump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Windows Management Instrumentation
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts2
                Service Execution
                1
                DLL Side-Loading
                11
                Process Injection
                31
                Virtualization/Sandbox Evasion
                LSASS Memory121
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media11
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Native API
                Logon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS22
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591533 Sample: wmnq39xe8J.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 49 edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com 2->49 51 bg.microsoft.map.fastly.net 2->51 67 Tries to download HTTP data from a sinkholed server 2->67 69 Suricata IDS alerts for network traffic 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 6 other signatures 2->73 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        53 192.168.2.102 unknown unknown 12->53 55 192.168.2.103 unknown unknown 12->55 57 98 other IPs or domains 12->57 83 Connects to many different private IPs via SMB (likely to spread or exploit) 12->83 85 Connects to many different private IPs (likely to spread or exploit) 12->85 signatures6 process7 file8 26 rundll32.exe 16->26         started        65 Drops executables to the windows directory (C:\Windows) and starts them 18->65 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 87 Drops executables to the windows directory (C:\Windows) and starts them 28->87 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 59 Antivirus detection for dropped file 32->59 61 Multi AV Scanner detection for dropped file 32->61 63 Machine Learning detection for dropped file 32->63 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 75 Detected Wannacry Ransomware 38->75 77 Antivirus detection for dropped file 38->77 79 Multi AV Scanner detection for dropped file 38->79 81 Machine Learning detection for dropped file 38->81

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                wmnq39xe8J.dll95%ReversingLabsWin32.Ransomware.WannaCry
                wmnq39xe8J.dll90%VirustotalBrowse
                wmnq39xe8J.dll100%AviraTR/AD.WannaCry.oppme
                wmnq39xe8J.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\mssecsvc.exe95%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com4#g0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                104.16.167.228
                truefalse
                  high
                  bg.microsoft.map.fastly.net
                  199.232.214.172
                  truefalse
                    high
                    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
                    84.201.210.23
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.4.drfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Xymssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2(xcmssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8xSmssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/FDmssecsvc.exe, 00000006.00000002.1488102985.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com4#gmssecsvc.exe, 0000000B.00000002.1502610125.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Hymssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://www.kryptoslogic.commssecsvc.exe, 00000006.00000002.1488102985.0000000000B5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hX0mssecsvc.exe, 00000008.00000002.2126492774.0000000000CFC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hzmssecsvc.exe, 0000000B.00000002.1502610125.0000000000C29000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Ymssecsvc.exe, 00000006.00000002.1488102985.0000000000B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2125977779.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              80.11.64.201
                                              unknownFrance
                                              3215FranceTelecom-OrangeFRfalse
                                              123.129.155.1
                                              unknownChina
                                              4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                              44.101.207.1
                                              unknownUnited States
                                              7377UCSDUSfalse
                                              52.12.87.90
                                              unknownUnited States
                                              16509AMAZON-02USfalse
                                              204.42.185.1
                                              unknownUnited States
                                              2914NTT-COMMUNICATIONS-2914USfalse
                                              45.38.55.1
                                              unknownUnited States
                                              18779EGIHOSTINGUSfalse
                                              123.129.155.244
                                              unknownChina
                                              4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                              218.91.200.1
                                              unknownChina
                                              4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                              164.203.238.166
                                              unknownUnited States
                                              3303SWISSCOMSwisscomSwitzerlandLtdCHfalse
                                              88.189.60.1
                                              unknownFrance
                                              12322PROXADFRfalse
                                              88.189.60.2
                                              unknownFrance
                                              12322PROXADFRfalse
                                              130.176.180.137
                                              unknownUnited States
                                              16509AMAZON-02USfalse
                                              139.64.238.1
                                              unknownReserved
                                              62809EXPOHLUSfalse
                                              45.38.55.229
                                              unknownUnited States
                                              18779EGIHOSTINGUSfalse
                                              220.130.244.1
                                              unknownTaiwan; Republic of China (ROC)
                                              3462HINETDataCommunicationBusinessGroupTWfalse
                                              181.27.172.97
                                              unknownArgentina
                                              22927TelefonicadeArgentinaARfalse
                                              48.132.234.51
                                              unknownUnited States
                                              2686ATGS-MMD-ASUSfalse
                                              220.130.244.3
                                              unknownTaiwan; Republic of China (ROC)
                                              3462HINETDataCommunicationBusinessGroupTWfalse
                                              18.65.28.2
                                              unknownUnited States
                                              3MIT-GATEWAYSUSfalse
                                              220.130.244.2
                                              unknownTaiwan; Republic of China (ROC)
                                              3462HINETDataCommunicationBusinessGroupTWfalse
                                              18.65.28.1
                                              unknownUnited States
                                              3MIT-GATEWAYSUSfalse
                                              121.66.99.35
                                              unknownKorea Republic of
                                              3786LGDACOMLGDACOMCorporationKRfalse
                                              121.66.99.1
                                              unknownKorea Republic of
                                              3786LGDACOMLGDACOMCorporationKRfalse
                                              IP
                                              192.168.2.148
                                              192.168.2.149
                                              192.168.2.146
                                              192.168.2.147
                                              192.168.2.140
                                              192.168.2.141
                                              192.168.2.144
                                              192.168.2.145
                                              192.168.2.142
                                              192.168.2.143
                                              192.168.2.159
                                              192.168.2.157
                                              192.168.2.158
                                              192.168.2.151
                                              192.168.2.152
                                              192.168.2.150
                                              192.168.2.155
                                              192.168.2.156
                                              192.168.2.153
                                              192.168.2.154
                                              192.168.2.126
                                              192.168.2.247
                                              192.168.2.127
                                              192.168.2.248
                                              192.168.2.124
                                              192.168.2.245
                                              192.168.2.125
                                              192.168.2.246
                                              192.168.2.128
                                              192.168.2.249
                                              192.168.2.129
                                              192.168.2.240
                                              192.168.2.122
                                              192.168.2.243
                                              192.168.2.123
                                              192.168.2.244
                                              192.168.2.120
                                              192.168.2.241
                                              192.168.2.121
                                              192.168.2.242
                                              192.168.2.97
                                              192.168.2.137
                                              192.168.2.96
                                              192.168.2.138
                                              192.168.2.99
                                              192.168.2.135
                                              192.168.2.98
                                              192.168.2.136
                                              192.168.2.139
                                              192.168.2.250
                                              192.168.2.130
                                              192.168.2.251
                                              192.168.2.91
                                              192.168.2.90
                                              192.168.2.93
                                              192.168.2.133
                                              192.168.2.254
                                              192.168.2.92
                                              192.168.2.134
                                              192.168.2.95
                                              192.168.2.131
                                              192.168.2.252
                                              192.168.2.94
                                              192.168.2.132
                                              192.168.2.253
                                              192.168.2.104
                                              192.168.2.225
                                              192.168.2.105
                                              192.168.2.226
                                              192.168.2.102
                                              192.168.2.223
                                              192.168.2.103
                                              192.168.2.224
                                              192.168.2.108
                                              192.168.2.229
                                              192.168.2.109
                                              192.168.2.106
                                              Joe Sandbox version:42.0.0 Malachite
                                              Analysis ID:1591533
                                              Start date and time:2025-01-15 02:59:07 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 5m 2s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:16
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:wmnq39xe8J.dll
                                              renamed because original name is a hash value
                                              Original Sample Name:bc82dd960fce92fc4b513e882dc1c873.dll
                                              Detection:MAL
                                              Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                              EGA Information:
                                              • Successful, ratio: 66.7%
                                              HCA Information:Failed
                                              Cookbook Comments:
                                              • Found application associated with file extension: .dll
                                              • Stop behavior analysis, all processes terminated
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                              • Excluded IPs from analysis (whitelisted): 4.245.163.56, 84.201.210.23, 184.30.131.245, 52.165.164.15, 2.23.77.188, 199.232.214.172
                                              • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target tasksche.exe, PID 4524 because there are no executed function
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              21:00:10API Interceptor1x Sleep call for process: loaddll32.exe modified
                                              21:00:44API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              80.11.64.201xv6VWWnSAPGet hashmaliciousMiraiBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comDocument_31055.pdfGet hashmaliciousUnknownBrowse
                                                • 217.20.57.19
                                                0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                                • 217.20.57.20
                                                1KaTo6P18Z.docGet hashmaliciousUnknownBrowse
                                                • 84.201.210.39
                                                original.emlGet hashmaliciousUnknownBrowse
                                                • 217.20.57.34
                                                RFQ____PC25-1301.xlsxGet hashmaliciousUnknownBrowse
                                                • 84.201.210.23
                                                577119676170175151.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 84.201.210.39
                                                3062912729105825642.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 217.20.57.18
                                                Rev5_ Joint Declaration C5 GER_track changes.docGet hashmaliciousUnknownBrowse
                                                • 217.20.57.20
                                                40#U0433.docGet hashmaliciousUnknownBrowse
                                                • 84.201.210.39
                                                Rev5_ Joint Declaration C5 GER_track changes.docGet hashmaliciousUnknownBrowse
                                                • 217.20.57.18
                                                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.167.228
                                                tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.167.228
                                                330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.166.228
                                                9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.166.228
                                                v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.167.228
                                                bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.167.228
                                                hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.167.228
                                                sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.166.228
                                                hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.167.228
                                                87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                                • 104.16.166.228
                                                bg.microsoft.map.fastly.netFinal-Agreement-Document#808977735.pdfGet hashmaliciousHTMLPhisherBrowse
                                                • 199.232.210.172
                                                tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                                • 199.232.214.172
                                                Document-01-16-25.pdfGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                Eastern Contractors Corporation Contract and submittal document.emlGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                                • 199.232.214.172
                                                https://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
                                                • 199.232.214.172
                                                jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                                • 199.232.214.172
                                                logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                                                • 199.232.214.172
                                                DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02US330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                                • 54.65.187.1
                                                EXTERNAL Your company's credit limit has changed!.msgGet hashmaliciousUnknownBrowse
                                                • 52.222.236.94
                                                https://cc68b94d-d9d0-4a03-bf37-d58a3335e1ce.p.reviewstudio.com/-/en/Computer-Zubehoer/b/?ie=UTF8&node=340843031&ref_=nav_cs_pcGet hashmaliciousUnknownBrowse
                                                • 3.254.238.10
                                                https://cc68b94d-d9d0-4a03-bf37-d58a3335e1ce.p.reviewstudio.com/-/en/b/?_encoding=UTF8&_encoding=UTF8&node=3024314031&bbn=16435051&pd_rd_w=VSdHJ&content-id=amzn1.sym.01fcb23a-92a2-4260-b9bf-7c78abf408da&pf_rd_p=01fcb23a-92a2-4260-b9bf-7c78abf408da&pf_rd_r=E0WD16QK99B55VAWSKBQ&pd_rd_wg=EU3Lj&pd_rd_r=fd3510c2-a6e6-4f59-a468-c59aac80bfa9&ref_=pd_hp_d_btf_unkGet hashmaliciousUnknownBrowse
                                                • 34.240.238.69
                                                https://cc68b94d-d9d0-4a03-bf37-d58a3335e1ce.p.reviewstudio.com/-/en/NYNY25/?_encoding=UTF8&pd_rd_w=WqHp4&content-id=amzn1.sym.33dfa5bb-d117-4590-a21d-8b7be5a7ab9d&pf_rd_p=33dfa5bb-d117-4590-a21d-8b7be5a7ab9d&pf_rd_r=E0WD16QK99B55VAWSKBQ&pd_rd_wg=EU3Lj&pd_rd_r=fd3510c2-a6e6-4f59-a468-c59aac80bfa9&ref_=pd_hp_d_btf_unkGet hashmaliciousUnknownBrowse
                                                • 108.138.7.91
                                                http://industrious-tomato-ngvkcs.mystrikingly.com/Get hashmaliciousUnknownBrowse
                                                • 52.84.150.39
                                                https://amhsbz.sbs/Get hashmaliciousUnknownBrowse
                                                • 52.216.33.57
                                                https://yolocdh.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                • 44.240.99.243
                                                https://informed.deliveryery.top/us/Get hashmaliciousHTMLPhisherBrowse
                                                • 18.245.46.22
                                                https://higbg7.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                • 44.240.99.243
                                                CHINA169-BACKBONECHINAUNICOMChina169BackboneCNhVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                                • 124.91.26.1
                                                542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                                                • 39.69.187.2
                                                GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                                • 27.13.195.1
                                                330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                                • 61.53.130.1
                                                9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                                • 39.87.158.1
                                                D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                                • 124.94.33.112
                                                sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                                • 39.80.197.203
                                                ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                                • 27.219.109.201
                                                eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                                • 182.119.252.121
                                                Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                                • 42.63.214.1
                                                UCSDUSmCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                                • 44.86.39.2
                                                Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                                • 44.161.110.199
                                                meth8.elfGet hashmaliciousMiraiBrowse
                                                • 44.63.122.194
                                                arm4.elfGet hashmaliciousUnknownBrowse
                                                • 44.60.240.87
                                                m68k.elfGet hashmaliciousUnknownBrowse
                                                • 44.37.223.28
                                                x86.elfGet hashmaliciousUnknownBrowse
                                                • 44.91.54.217
                                                meth14.elfGet hashmaliciousMiraiBrowse
                                                • 44.101.168.151
                                                meth9.elfGet hashmaliciousMiraiBrowse
                                                • 44.77.55.220
                                                mips.elfGet hashmaliciousUnknownBrowse
                                                • 44.91.54.239
                                                meth6.elfGet hashmaliciousMiraiBrowse
                                                • 44.104.249.108
                                                FranceTelecom-OrangeFRFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                                • 86.222.100.204
                                                arm4.elfGet hashmaliciousUnknownBrowse
                                                • 82.126.236.100
                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                • 86.199.208.24
                                                m68k.elfGet hashmaliciousUnknownBrowse
                                                • 86.217.36.112
                                                spc.elfGet hashmaliciousUnknownBrowse
                                                • 86.204.26.111
                                                x86_64.elfGet hashmaliciousUnknownBrowse
                                                • 2.6.97.69
                                                meth14.elfGet hashmaliciousMiraiBrowse
                                                • 90.80.188.101
                                                mpsl.elfGet hashmaliciousUnknownBrowse
                                                • 86.193.209.223
                                                meth7.elfGet hashmaliciousMiraiBrowse
                                                • 217.109.173.208
                                                elitebotnet.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 90.23.8.117
                                                No context
                                                No context
                                                Process:C:\Windows\mssecsvc.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3514368
                                                Entropy (8bit):6.378270884123479
                                                Encrypted:false
                                                SSDEEP:49152:nQqMSPbcBVnRdhnvxJM0H9PAMEcaEau3R8yAH1plAHj:QqPoBHdhvxWa9P593R8yAVp2Hj
                                                MD5:CE950EA6E27D1637EF799EDA580C8073
                                                SHA1:D6983DA32DD48E2FF74141082363113EDE43DE22
                                                SHA-256:E0EBDB3DBAB566372F899522403D22F558C104D51B642C162B40A55DEF69D791
                                                SHA-512:33E286A966680D31076B0108AB7EA5C76227F19120AF7F0FCFC3B03CDCD5DF0DA94E294EB469B398DFDA090A2A5F1B066BB5E0A942AA8FDDC66897FB367BC841
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 93%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3723264
                                                Entropy (8bit):6.397340153682157
                                                Encrypted:false
                                                SSDEEP:49152:XnAQqMSPbcBVnRdhnvxJM0H9PAMEcaEau3R8yAH1plAHI:XDqPoBHdhvxWa9P593R8yAVp2HI
                                                MD5:E676BB073144D631575F56DF2FAE4CE8
                                                SHA1:71FBA6152FDC15D3ABEF68A5037F45E65C6308B7
                                                SHA-256:4F5A1CA181CA6ABBF43A2AEFA3E6042C37A3EEB694CF72A0DF57C6C853BC1403
                                                SHA-512:7AEDF5E7A92FB887FDE3CFF2525990FEF4E1E52C4381275F7F4BB91DBFD0D93E738A9AEB2EC826C3E8B5D3F3C78301DEEB4A862D08856A148EDC6F19C6431779
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                                • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 95%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\mssecsvc.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3514368
                                                Entropy (8bit):6.378270884123479
                                                Encrypted:false
                                                SSDEEP:49152:nQqMSPbcBVnRdhnvxJM0H9PAMEcaEau3R8yAH1plAHj:QqPoBHdhvxWa9P593R8yAVp2Hj
                                                MD5:CE950EA6E27D1637EF799EDA580C8073
                                                SHA1:D6983DA32DD48E2FF74141082363113EDE43DE22
                                                SHA-256:E0EBDB3DBAB566372F899522403D22F558C104D51B642C162B40A55DEF69D791
                                                SHA-512:33E286A966680D31076B0108AB7EA5C76227F19120AF7F0FCFC3B03CDCD5DF0DA94E294EB469B398DFDA090A2A5F1B066BB5E0A942AA8FDDC66897FB367BC841
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 93%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):4.890783116715608
                                                TrID:
                                                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                • Generic Win/DOS Executable (2004/3) 0.20%
                                                • DOS Executable Generic (2002/1) 0.20%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:wmnq39xe8J.dll
                                                File size:5'267'459 bytes
                                                MD5:bc82dd960fce92fc4b513e882dc1c873
                                                SHA1:65d63b04ed6376a13dea83eb7937a8d6ec95e278
                                                SHA256:8c1d22bd6ff6abd10f01e97c39cd6455c1abf72e45760050ff1bb5f554f7c5b4
                                                SHA512:82439d1ef59c7ba4b79ea030caa8acde8442779df4eda3269edf9d5a1cdc745f03e0356523ce377e8dd9b25067395e5a77fe4d900aab256aa5a2c8a388ccb15e
                                                SSDEEP:49152:znAQqMSPbcBVnRdhnvxJM0H9PAMEcaEau3R8yAH1plAH:TDqPoBHdhvxWa9P593R8yAVp2H
                                                TLSH:8A363390671C61BCF0A90AB45433492DB7777D29A73A872F97C0C7660C53B93AEE4B05
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                Icon Hash:7ae282899bbab082
                                                Entrypoint:0x100011e9
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x10000000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                DLL Characteristics:
                                                Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                push ebx
                                                mov ebx, dword ptr [ebp+08h]
                                                push esi
                                                mov esi, dword ptr [ebp+0Ch]
                                                push edi
                                                mov edi, dword ptr [ebp+10h]
                                                test esi, esi
                                                jne 00007FC134AE463Bh
                                                cmp dword ptr [10003140h], 00000000h
                                                jmp 00007FC134AE4658h
                                                cmp esi, 01h
                                                je 00007FC134AE4637h
                                                cmp esi, 02h
                                                jne 00007FC134AE4654h
                                                mov eax, dword ptr [10003150h]
                                                test eax, eax
                                                je 00007FC134AE463Bh
                                                push edi
                                                push esi
                                                push ebx
                                                call eax
                                                test eax, eax
                                                je 00007FC134AE463Eh
                                                push edi
                                                push esi
                                                push ebx
                                                call 00007FC134AE454Ah
                                                test eax, eax
                                                jne 00007FC134AE4636h
                                                xor eax, eax
                                                jmp 00007FC134AE4680h
                                                push edi
                                                push esi
                                                push ebx
                                                call 00007FC134AE43FCh
                                                cmp esi, 01h
                                                mov dword ptr [ebp+0Ch], eax
                                                jne 00007FC134AE463Eh
                                                test eax, eax
                                                jne 00007FC134AE4669h
                                                push edi
                                                push eax
                                                push ebx
                                                call 00007FC134AE4526h
                                                test esi, esi
                                                je 00007FC134AE4637h
                                                cmp esi, 03h
                                                jne 00007FC134AE4658h
                                                push edi
                                                push esi
                                                push ebx
                                                call 00007FC134AE4515h
                                                test eax, eax
                                                jne 00007FC134AE4635h
                                                and dword ptr [ebp+0Ch], eax
                                                cmp dword ptr [ebp+0Ch], 00000000h
                                                je 00007FC134AE4643h
                                                mov eax, dword ptr [10003150h]
                                                test eax, eax
                                                je 00007FC134AE463Ah
                                                push edi
                                                push esi
                                                push ebx
                                                call eax
                                                mov dword ptr [ebp+0Ch], eax
                                                mov eax, dword ptr [ebp+0Ch]
                                                pop edi
                                                pop esi
                                                pop ebx
                                                pop ebp
                                                retn 000Ch
                                                jmp dword ptr [10002028h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                Programming Language:
                                                • [ C ] VS98 (6.0) build 8168
                                                • [C++] VS98 (6.0) build 8168
                                                • [RES] VS98 (6.0) cvtres build 1720
                                                • [LNK] VS98 (6.0) imp/exp build 8168
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x40000x5000600x501000e436d01d742e2ea4ad374808d35ab15dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                W0x40600x500000dataEnglishUnited States0.7055644989013672
                                                DLLImport
                                                KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                NameOrdinalAddress
                                                PlayGame10x10001114
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2025-01-15T03:00:09.737533+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8566501.1.1.153UDP
                                                2025-01-15T03:00:10.266516+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849705104.16.167.22880TCP
                                                2025-01-15T03:00:10.266516+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849705104.16.167.22880TCP
                                                2025-01-15T03:00:10.266516+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849705104.16.167.22880TCP
                                                2025-01-15T03:00:10.266516+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849705104.16.167.22880TCP
                                                2025-01-15T03:00:10.266516+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849705104.16.167.22880TCP
                                                2025-01-15T03:00:10.268072+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849705TCP
                                                2025-01-15T03:00:11.270652+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849706104.16.167.22880TCP
                                                2025-01-15T03:00:11.270652+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849706104.16.167.22880TCP
                                                2025-01-15T03:00:11.270652+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849706104.16.167.22880TCP
                                                2025-01-15T03:00:11.270652+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849706104.16.167.22880TCP
                                                2025-01-15T03:00:11.270652+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849706104.16.167.22880TCP
                                                2025-01-15T03:00:11.270936+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849706TCP
                                                2025-01-15T03:00:12.777089+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849723104.16.167.22880TCP
                                                2025-01-15T03:00:12.777089+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849723104.16.167.22880TCP
                                                2025-01-15T03:00:12.777089+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849723104.16.167.22880TCP
                                                2025-01-15T03:00:12.777089+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849723104.16.167.22880TCP
                                                2025-01-15T03:00:12.777089+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849723104.16.167.22880TCP
                                                2025-01-15T03:00:12.778191+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849723TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 15, 2025 03:00:00.818183899 CET49672443192.168.2.823.206.229.226
                                                Jan 15, 2025 03:00:08.255647898 CET49676443192.168.2.852.182.143.211
                                                Jan 15, 2025 03:00:09.750834942 CET4970580192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:09.755836964 CET8049705104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:09.756021976 CET4970580192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:09.756155014 CET4970580192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:09.760915995 CET8049705104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:10.265729904 CET8049705104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:10.266515970 CET4970580192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:10.268071890 CET8049705104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:10.268136024 CET4970580192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:10.282457113 CET4970580192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:10.287224054 CET8049705104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:10.427455902 CET49672443192.168.2.823.206.229.226
                                                Jan 15, 2025 03:00:10.790931940 CET4970680192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:10.795766115 CET8049706104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:10.795849085 CET4970680192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:10.796967030 CET4970680192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:10.801708937 CET8049706104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:10.896178007 CET4967780192.168.2.8192.229.211.108
                                                Jan 15, 2025 03:00:11.270590067 CET8049706104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:11.270652056 CET4970680192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:11.270770073 CET4970680192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:11.270936012 CET8049706104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:11.270975113 CET4970680192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:11.275471926 CET8049706104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:11.315037012 CET49707445192.168.2.818.65.28.207
                                                Jan 15, 2025 03:00:11.319854021 CET4454970718.65.28.207192.168.2.8
                                                Jan 15, 2025 03:00:11.319916964 CET49707445192.168.2.818.65.28.207
                                                Jan 15, 2025 03:00:11.319979906 CET49707445192.168.2.818.65.28.207
                                                Jan 15, 2025 03:00:11.320219040 CET49708445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.324887991 CET4454970718.65.28.207192.168.2.8
                                                Jan 15, 2025 03:00:11.324935913 CET49707445192.168.2.818.65.28.207
                                                Jan 15, 2025 03:00:11.324945927 CET4454970818.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:11.324999094 CET49708445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.325072050 CET49708445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.329911947 CET4454970818.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:11.329958916 CET49708445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.338438988 CET49709445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.343122959 CET4454970918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:11.343174934 CET49709445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.343252897 CET49709445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:11.347943068 CET4454970918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:12.171469927 CET4434970423.206.229.226192.168.2.8
                                                Jan 15, 2025 03:00:12.171585083 CET49704443192.168.2.823.206.229.226
                                                Jan 15, 2025 03:00:12.284615993 CET4972380192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:12.289498091 CET8049723104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:12.289578915 CET4972380192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:12.289781094 CET4972380192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:12.294676065 CET8049723104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:12.776971102 CET8049723104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:12.777089119 CET4972380192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:12.777190924 CET4972380192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:12.778191090 CET8049723104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:12.778248072 CET4972380192.168.2.8104.16.167.228
                                                Jan 15, 2025 03:00:12.781929016 CET8049723104.16.167.228192.168.2.8
                                                Jan 15, 2025 03:00:13.319734097 CET49733445192.168.2.888.189.60.34
                                                Jan 15, 2025 03:00:13.324556112 CET4454973388.189.60.34192.168.2.8
                                                Jan 15, 2025 03:00:13.324644089 CET49733445192.168.2.888.189.60.34
                                                Jan 15, 2025 03:00:13.324707031 CET49733445192.168.2.888.189.60.34
                                                Jan 15, 2025 03:00:13.324904919 CET49734445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.329787970 CET4454973488.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:13.329802036 CET4454973388.189.60.34192.168.2.8
                                                Jan 15, 2025 03:00:13.329864979 CET49733445192.168.2.888.189.60.34
                                                Jan 15, 2025 03:00:13.329879999 CET49734445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.330085993 CET49734445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.331085920 CET49735445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.334901094 CET4454973488.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:13.335005999 CET49734445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.335932016 CET4454973588.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:13.336005926 CET49735445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.336091042 CET49735445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:13.340888023 CET4454973588.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:15.405042887 CET49758445192.168.2.848.132.234.51
                                                Jan 15, 2025 03:00:15.409971952 CET4454975848.132.234.51192.168.2.8
                                                Jan 15, 2025 03:00:15.410058022 CET49758445192.168.2.848.132.234.51
                                                Jan 15, 2025 03:00:15.410249949 CET49758445192.168.2.848.132.234.51
                                                Jan 15, 2025 03:00:15.410448074 CET49759445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.415183067 CET4454975848.132.234.51192.168.2.8
                                                Jan 15, 2025 03:00:15.415265083 CET49758445192.168.2.848.132.234.51
                                                Jan 15, 2025 03:00:15.415369034 CET4454975948.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:15.415433884 CET49759445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.415512085 CET49759445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.420510054 CET4454975948.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:15.420579910 CET49759445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.420924902 CET49760445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.425807953 CET4454976048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:15.425884962 CET49760445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.428653002 CET49760445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:15.433878899 CET4454976048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:17.397805929 CET49782445192.168.2.8185.88.214.197
                                                Jan 15, 2025 03:00:17.402744055 CET44549782185.88.214.197192.168.2.8
                                                Jan 15, 2025 03:00:17.402882099 CET49782445192.168.2.8185.88.214.197
                                                Jan 15, 2025 03:00:17.402978897 CET49782445192.168.2.8185.88.214.197
                                                Jan 15, 2025 03:00:17.403300047 CET49783445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.407937050 CET44549782185.88.214.197192.168.2.8
                                                Jan 15, 2025 03:00:17.408029079 CET49782445192.168.2.8185.88.214.197
                                                Jan 15, 2025 03:00:17.408193111 CET44549783185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:17.408269882 CET49783445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.408428907 CET49783445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.409698009 CET49784445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.413333893 CET44549783185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:17.413433075 CET49783445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.414566994 CET44549784185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:17.414663076 CET49784445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.414733887 CET49784445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:17.419552088 CET44549784185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:19.413223982 CET49802445192.168.2.857.106.150.138
                                                Jan 15, 2025 03:00:19.418059111 CET4454980257.106.150.138192.168.2.8
                                                Jan 15, 2025 03:00:19.418236971 CET49802445192.168.2.857.106.150.138
                                                Jan 15, 2025 03:00:19.418471098 CET49802445192.168.2.857.106.150.138
                                                Jan 15, 2025 03:00:19.418879986 CET49803445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.423419952 CET4454980257.106.150.138192.168.2.8
                                                Jan 15, 2025 03:00:19.423533916 CET49802445192.168.2.857.106.150.138
                                                Jan 15, 2025 03:00:19.423800945 CET4454980357.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:19.423872948 CET49803445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.423943043 CET49803445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.424953938 CET49804445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.428864956 CET4454980357.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:19.428986073 CET49803445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.429769039 CET4454980457.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:19.429950953 CET49804445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.430044889 CET49804445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:19.434848070 CET4454980457.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:21.428580999 CET49828445192.168.2.8144.240.93.87
                                                Jan 15, 2025 03:00:21.508728981 CET44549828144.240.93.87192.168.2.8
                                                Jan 15, 2025 03:00:21.508799076 CET49828445192.168.2.8144.240.93.87
                                                Jan 15, 2025 03:00:21.508899927 CET49828445192.168.2.8144.240.93.87
                                                Jan 15, 2025 03:00:21.509205103 CET49830445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.513822079 CET44549828144.240.93.87192.168.2.8
                                                Jan 15, 2025 03:00:21.513870955 CET49828445192.168.2.8144.240.93.87
                                                Jan 15, 2025 03:00:21.513986111 CET44549830144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:21.514085054 CET49830445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.514377117 CET49830445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.515475035 CET49831445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.519185066 CET44549830144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:21.519273043 CET49830445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.520306110 CET44549831144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:21.520365953 CET49831445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.520427942 CET49831445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:21.525167942 CET44549831144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:23.443531990 CET49855445192.168.2.855.183.182.91
                                                Jan 15, 2025 03:00:23.449865103 CET4454985555.183.182.91192.168.2.8
                                                Jan 15, 2025 03:00:23.449948072 CET49855445192.168.2.855.183.182.91
                                                Jan 15, 2025 03:00:23.449975014 CET49855445192.168.2.855.183.182.91
                                                Jan 15, 2025 03:00:23.450124979 CET49856445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.454945087 CET4454985555.183.182.91192.168.2.8
                                                Jan 15, 2025 03:00:23.454962015 CET4454985655.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:23.454998016 CET49855445192.168.2.855.183.182.91
                                                Jan 15, 2025 03:00:23.455058098 CET49856445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.455148935 CET49856445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.455459118 CET49857445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.460375071 CET4454985755.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:23.460412025 CET4454985655.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:23.460447073 CET49857445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.460472107 CET49856445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.460598946 CET49857445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:23.465492964 CET4454985755.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:25.459219933 CET49879445192.168.2.8181.27.172.97
                                                Jan 15, 2025 03:00:25.463987112 CET44549879181.27.172.97192.168.2.8
                                                Jan 15, 2025 03:00:25.464080095 CET49879445192.168.2.8181.27.172.97
                                                Jan 15, 2025 03:00:25.464188099 CET49879445192.168.2.8181.27.172.97
                                                Jan 15, 2025 03:00:25.464389086 CET49881445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.468939066 CET44549879181.27.172.97192.168.2.8
                                                Jan 15, 2025 03:00:25.468996048 CET49879445192.168.2.8181.27.172.97
                                                Jan 15, 2025 03:00:25.469259024 CET44549881181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:25.469335079 CET49881445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.469414949 CET49881445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.469729900 CET49882445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.474247932 CET44549881181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:25.474355936 CET49881445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.474605083 CET44549882181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:25.474669933 CET49882445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.474697113 CET49882445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:25.479542017 CET44549882181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:27.475240946 CET49904445192.168.2.835.231.51.114
                                                Jan 15, 2025 03:00:27.480098009 CET4454990435.231.51.114192.168.2.8
                                                Jan 15, 2025 03:00:27.480216026 CET49904445192.168.2.835.231.51.114
                                                Jan 15, 2025 03:00:27.480302095 CET49904445192.168.2.835.231.51.114
                                                Jan 15, 2025 03:00:27.480484009 CET49905445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.485251904 CET4454990535.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:27.485311985 CET49905445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.485382080 CET49905445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.485697031 CET4454990435.231.51.114192.168.2.8
                                                Jan 15, 2025 03:00:27.485698938 CET49906445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.485743999 CET49904445192.168.2.835.231.51.114
                                                Jan 15, 2025 03:00:27.490729094 CET4454990535.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:27.490783930 CET49905445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.491483927 CET4454990635.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:27.491547108 CET49906445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.491600037 CET49906445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:27.496365070 CET4454990635.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:29.492192984 CET49928445192.168.2.8220.130.244.253
                                                Jan 15, 2025 03:00:29.497076035 CET44549928220.130.244.253192.168.2.8
                                                Jan 15, 2025 03:00:29.497221947 CET49928445192.168.2.8220.130.244.253
                                                Jan 15, 2025 03:00:29.497370958 CET49928445192.168.2.8220.130.244.253
                                                Jan 15, 2025 03:00:29.497541904 CET49930445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.502826929 CET44549930220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:29.502964973 CET49930445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.503043890 CET49930445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.503345966 CET49931445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.504380941 CET44549928220.130.244.253192.168.2.8
                                                Jan 15, 2025 03:00:29.505291939 CET44549928220.130.244.253192.168.2.8
                                                Jan 15, 2025 03:00:29.505363941 CET49928445192.168.2.8220.130.244.253
                                                Jan 15, 2025 03:00:29.508021116 CET44549930220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:29.508088112 CET49930445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.508167982 CET44549931220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:29.508239031 CET49931445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.508323908 CET49931445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:29.513907909 CET44549931220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:31.509700060 CET49953445192.168.2.8130.176.180.137
                                                Jan 15, 2025 03:00:31.514467001 CET44549953130.176.180.137192.168.2.8
                                                Jan 15, 2025 03:00:31.514561892 CET49953445192.168.2.8130.176.180.137
                                                Jan 15, 2025 03:00:31.514671087 CET49953445192.168.2.8130.176.180.137
                                                Jan 15, 2025 03:00:31.514903069 CET49954445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.519575119 CET44549953130.176.180.137192.168.2.8
                                                Jan 15, 2025 03:00:31.519642115 CET49953445192.168.2.8130.176.180.137
                                                Jan 15, 2025 03:00:31.519778967 CET44549954130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:31.519850016 CET49954445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.519974947 CET49954445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.521003962 CET49955445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.524799109 CET44549954130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:31.524861097 CET49954445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.525768042 CET44549955130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:31.525847912 CET49955445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.525969982 CET49955445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:31.530698061 CET44549955130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:31.602230072 CET44549931220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:31.602444887 CET49931445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:31.602444887 CET49931445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:31.602444887 CET49931445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:31.607310057 CET44549931220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:31.607326031 CET44549931220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:32.726210117 CET4454970918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:32.726295948 CET49709445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:32.726345062 CET49709445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:32.726411104 CET49709445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:32.731163025 CET4454970918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:32.731194019 CET4454970918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:33.521742105 CET49978445192.168.2.8221.124.139.20
                                                Jan 15, 2025 03:00:33.528933048 CET44549978221.124.139.20192.168.2.8
                                                Jan 15, 2025 03:00:33.529050112 CET49978445192.168.2.8221.124.139.20
                                                Jan 15, 2025 03:00:33.529068947 CET49978445192.168.2.8221.124.139.20
                                                Jan 15, 2025 03:00:33.529290915 CET49979445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.535206079 CET44549979221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:33.535227060 CET44549978221.124.139.20192.168.2.8
                                                Jan 15, 2025 03:00:33.535332918 CET49978445192.168.2.8221.124.139.20
                                                Jan 15, 2025 03:00:33.535487890 CET49979445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.535487890 CET49979445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.535815001 CET49980445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.542619944 CET44549979221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:33.542640924 CET44549979221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:33.542694092 CET49979445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.542754889 CET44549980221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:33.542810917 CET49980445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.542850018 CET49980445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:33.547624111 CET44549980221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:34.615262985 CET49993445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:34.621670961 CET44549993220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:34.621803045 CET49993445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:34.624618053 CET49993445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:34.631087065 CET44549993220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:34.710272074 CET4454973588.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:34.710393906 CET49735445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:34.710489988 CET49735445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:34.710591078 CET49735445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:34.716731071 CET4454973588.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:34.717178106 CET4454973588.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:35.537542105 CET50004445192.168.2.8121.66.99.35
                                                Jan 15, 2025 03:00:35.542412043 CET44550004121.66.99.35192.168.2.8
                                                Jan 15, 2025 03:00:35.542634010 CET50004445192.168.2.8121.66.99.35
                                                Jan 15, 2025 03:00:35.542721033 CET50004445192.168.2.8121.66.99.35
                                                Jan 15, 2025 03:00:35.542949915 CET50005445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.547597885 CET44550004121.66.99.35192.168.2.8
                                                Jan 15, 2025 03:00:35.547677994 CET50004445192.168.2.8121.66.99.35
                                                Jan 15, 2025 03:00:35.547734976 CET44550005121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:35.547790051 CET50005445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.547830105 CET50005445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.548253059 CET50006445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.552907944 CET44550005121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:35.552979946 CET50005445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.553287983 CET44550006121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:35.553353071 CET50006445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.553416967 CET50006445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:35.558145046 CET44550006121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:35.740353107 CET50009445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:35.759267092 CET4455000918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:35.759462118 CET50009445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:35.759462118 CET50009445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:35.765162945 CET4455000918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:36.672528982 CET44549993220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:36.672636032 CET49993445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:36.672723055 CET49993445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:36.672780037 CET49993445192.168.2.8220.130.244.1
                                                Jan 15, 2025 03:00:36.677773952 CET44549993220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:36.677788019 CET44549993220.130.244.1192.168.2.8
                                                Jan 15, 2025 03:00:36.724735975 CET50011445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.729594946 CET44550011220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:36.729731083 CET50011445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.729746103 CET50011445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.730140924 CET50012445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.734838963 CET44550011220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:36.734910965 CET50011445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.734952927 CET44550012220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:36.735009909 CET50012445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.735035896 CET50012445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:36.740648985 CET44550012220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:36.823694944 CET4454976048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:36.823776007 CET49760445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:36.823838949 CET49760445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:36.823905945 CET49760445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:36.828690052 CET4454976048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:36.828704119 CET4454976048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:37.553121090 CET50013445192.168.2.892.216.155.246
                                                Jan 15, 2025 03:00:37.557993889 CET4455001392.216.155.246192.168.2.8
                                                Jan 15, 2025 03:00:37.558085918 CET50013445192.168.2.892.216.155.246
                                                Jan 15, 2025 03:00:37.558152914 CET50013445192.168.2.892.216.155.246
                                                Jan 15, 2025 03:00:37.558408022 CET50014445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.563040018 CET4455001392.216.155.246192.168.2.8
                                                Jan 15, 2025 03:00:37.563108921 CET50013445192.168.2.892.216.155.246
                                                Jan 15, 2025 03:00:37.563186884 CET4455001492.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:37.563249111 CET50014445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.563266039 CET50014445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.563581944 CET50015445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.568141937 CET4455001492.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:37.568203926 CET50014445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.568396091 CET4455001592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:37.568458080 CET50015445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.568502903 CET50015445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:37.573307991 CET4455001592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:37.724744081 CET50016445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:37.729561090 CET4455001688.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:37.729691029 CET50016445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:37.736707926 CET50016445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:37.741544962 CET4455001688.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:38.771147966 CET44549784185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:38.771357059 CET49784445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:38.771410942 CET49784445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:38.771490097 CET49784445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:38.776159048 CET44549784185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:38.776256084 CET44549784185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:38.802582979 CET44550012220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:38.802707911 CET50012445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:38.802809954 CET50012445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:38.802862883 CET50012445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:38.807647943 CET44550012220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:38.807658911 CET44550012220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:39.570286989 CET50017445192.168.2.845.38.55.229
                                                Jan 15, 2025 03:00:39.575098991 CET4455001745.38.55.229192.168.2.8
                                                Jan 15, 2025 03:00:39.575169086 CET50017445192.168.2.845.38.55.229
                                                Jan 15, 2025 03:00:39.575215101 CET50017445192.168.2.845.38.55.229
                                                Jan 15, 2025 03:00:39.575375080 CET50018445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.580190897 CET4455001845.38.55.1192.168.2.8
                                                Jan 15, 2025 03:00:39.580255032 CET50018445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.580271959 CET4455001745.38.55.229192.168.2.8
                                                Jan 15, 2025 03:00:39.580280066 CET50018445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.580662966 CET50019445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.581500053 CET4455001745.38.55.229192.168.2.8
                                                Jan 15, 2025 03:00:39.581543922 CET50017445192.168.2.845.38.55.229
                                                Jan 15, 2025 03:00:39.585320950 CET4455001845.38.55.1192.168.2.8
                                                Jan 15, 2025 03:00:39.585367918 CET50018445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.585422039 CET4455001945.38.55.1192.168.2.8
                                                Jan 15, 2025 03:00:39.585479021 CET50019445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.585500002 CET50019445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:00:39.590289116 CET4455001945.38.55.1192.168.2.8
                                                Jan 15, 2025 03:00:39.836483955 CET50020445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:39.841319084 CET4455002048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:39.844796896 CET50020445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:39.844873905 CET50020445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:00:39.849644899 CET4455002048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:00:40.806763887 CET4454980457.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:40.806837082 CET49804445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:40.806880951 CET49804445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:40.806950092 CET49804445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:40.811672926 CET4454980457.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:40.811724901 CET4454980457.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:41.586303949 CET50021445192.168.2.8139.64.238.81
                                                Jan 15, 2025 03:00:41.593138933 CET44550021139.64.238.81192.168.2.8
                                                Jan 15, 2025 03:00:41.593228102 CET50021445192.168.2.8139.64.238.81
                                                Jan 15, 2025 03:00:41.593297958 CET50021445192.168.2.8139.64.238.81
                                                Jan 15, 2025 03:00:41.593409061 CET50022445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.598254919 CET44550022139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:00:41.598325968 CET50022445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.598366022 CET50022445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.598620892 CET50023445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.601075888 CET44550021139.64.238.81192.168.2.8
                                                Jan 15, 2025 03:00:41.601138115 CET50021445192.168.2.8139.64.238.81
                                                Jan 15, 2025 03:00:41.603404999 CET44550023139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:00:41.603415966 CET44550022139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:00:41.603490114 CET50022445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.603570938 CET50023445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.603570938 CET50023445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:00:41.608347893 CET44550023139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:00:41.793688059 CET50024445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:41.798541069 CET44550024185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:41.798645020 CET50024445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:41.798706055 CET50024445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:00:41.803467989 CET44550024185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:00:41.822882891 CET50025445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:41.829859018 CET44550025220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:41.829993010 CET50025445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:41.831469059 CET50025445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:41.837702990 CET44550025220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:42.881388903 CET44549831144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:42.881548882 CET49831445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:42.881548882 CET49831445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:42.881624937 CET49831445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:42.886364937 CET44549831144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:42.886375904 CET44549831144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:43.600275993 CET50026445192.168.2.8131.170.148.102
                                                Jan 15, 2025 03:00:43.605249882 CET44550026131.170.148.102192.168.2.8
                                                Jan 15, 2025 03:00:43.605353117 CET50026445192.168.2.8131.170.148.102
                                                Jan 15, 2025 03:00:43.605456114 CET50026445192.168.2.8131.170.148.102
                                                Jan 15, 2025 03:00:43.605721951 CET50027445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.610287905 CET44550026131.170.148.102192.168.2.8
                                                Jan 15, 2025 03:00:43.610351086 CET50026445192.168.2.8131.170.148.102
                                                Jan 15, 2025 03:00:43.610733032 CET44550027131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:00:43.610794067 CET50027445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.610817909 CET50027445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.611139059 CET50028445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.615710020 CET44550027131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:00:43.615787029 CET50027445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.615905046 CET44550028131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:00:43.615961075 CET50028445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.615993977 CET50028445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:00:43.620737076 CET44550028131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:00:43.819112062 CET50029445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:43.823879957 CET4455002957.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:43.824090958 CET50029445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:43.824090958 CET50029445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:00:43.828852892 CET4455002957.106.150.1192.168.2.8
                                                Jan 15, 2025 03:00:43.896469116 CET44550025220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:43.896526098 CET50025445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:43.896647930 CET50025445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:43.896684885 CET50025445192.168.2.8220.130.244.2
                                                Jan 15, 2025 03:00:43.901460886 CET44550025220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:43.901472092 CET44550025220.130.244.2192.168.2.8
                                                Jan 15, 2025 03:00:43.959259987 CET50030445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.964210033 CET44550030220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:00:43.964416981 CET50030445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.964479923 CET50030445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.965002060 CET50031445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.969469070 CET44550030220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:00:43.969525099 CET50030445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.969862938 CET44550031220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:00:43.969918966 CET50031445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.969980955 CET50031445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:00:43.974754095 CET44550031220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:00:44.837965012 CET4454985755.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:44.838149071 CET49857445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:44.838149071 CET49857445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:44.838520050 CET49857445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:44.842947006 CET4454985755.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:44.843241930 CET4454985755.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:45.617422104 CET50032445192.168.2.8153.18.105.105
                                                Jan 15, 2025 03:00:45.622412920 CET44550032153.18.105.105192.168.2.8
                                                Jan 15, 2025 03:00:45.622565031 CET50032445192.168.2.8153.18.105.105
                                                Jan 15, 2025 03:00:45.626698971 CET50032445192.168.2.8153.18.105.105
                                                Jan 15, 2025 03:00:45.627155066 CET50033445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.631716013 CET44550032153.18.105.105192.168.2.8
                                                Jan 15, 2025 03:00:45.631797075 CET50032445192.168.2.8153.18.105.105
                                                Jan 15, 2025 03:00:45.632138968 CET44550033153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:00:45.632204056 CET50033445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.632309914 CET50033445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.632675886 CET50034445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.638993979 CET44550034153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:00:45.639012098 CET44550033153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:00:45.639062881 CET50034445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.639086008 CET50033445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.639113903 CET50034445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:00:45.644097090 CET44550034153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:00:45.896754980 CET50035445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:45.901626110 CET44550035144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:45.901755095 CET50035445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:45.901788950 CET50035445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:00:45.906599045 CET44550035144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:00:46.884701967 CET44549882181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:46.884768009 CET49882445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:46.884855986 CET49882445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:46.884902000 CET49882445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:46.889693975 CET44549882181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:46.889705896 CET44549882181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:47.490566969 CET50036445192.168.2.8162.93.115.187
                                                Jan 15, 2025 03:00:47.496273041 CET44550036162.93.115.187192.168.2.8
                                                Jan 15, 2025 03:00:47.496351004 CET50036445192.168.2.8162.93.115.187
                                                Jan 15, 2025 03:00:47.496442080 CET50036445192.168.2.8162.93.115.187
                                                Jan 15, 2025 03:00:47.496615887 CET50037445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.502391100 CET44550037162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:00:47.502471924 CET50037445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.502573967 CET50037445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.502973080 CET50038445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.504311085 CET44550036162.93.115.187192.168.2.8
                                                Jan 15, 2025 03:00:47.505611897 CET44550036162.93.115.187192.168.2.8
                                                Jan 15, 2025 03:00:47.505673885 CET50036445192.168.2.8162.93.115.187
                                                Jan 15, 2025 03:00:47.508069992 CET44550038162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:00:47.508150101 CET50038445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.508191109 CET50038445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.508322001 CET44550037162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:00:47.508373022 CET44550037162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:00:47.508415937 CET50037445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:00:47.512974977 CET44550038162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:00:47.849713087 CET50039445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:47.854557037 CET4455003955.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:47.858623028 CET50039445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:47.858675957 CET50039445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:00:47.863476992 CET4455003955.183.182.1192.168.2.8
                                                Jan 15, 2025 03:00:48.865299940 CET4454990635.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:48.865374088 CET49906445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:48.865458965 CET49906445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:48.865513086 CET49906445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:48.870203972 CET4454990635.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:48.870246887 CET4454990635.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:49.383785009 CET50040445192.168.2.8218.91.200.156
                                                Jan 15, 2025 03:00:49.388698101 CET44550040218.91.200.156192.168.2.8
                                                Jan 15, 2025 03:00:49.388773918 CET50040445192.168.2.8218.91.200.156
                                                Jan 15, 2025 03:00:49.389508009 CET50040445192.168.2.8218.91.200.156
                                                Jan 15, 2025 03:00:49.389698029 CET50041445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.394324064 CET44550040218.91.200.156192.168.2.8
                                                Jan 15, 2025 03:00:49.394382000 CET50040445192.168.2.8218.91.200.156
                                                Jan 15, 2025 03:00:49.394548893 CET44550041218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:00:49.394613981 CET50041445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.397404909 CET50041445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.402225018 CET44550041218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:00:49.402278900 CET50041445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.403542042 CET50042445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.408356905 CET44550042218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:00:49.408422947 CET50042445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.411819935 CET50042445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:00:49.416563034 CET44550042218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:00:49.896717072 CET50043445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:49.902875900 CET44550043181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:49.903769970 CET50043445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:49.903919935 CET50043445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:00:49.910125017 CET44550043181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:00:51.021985054 CET50044445192.168.2.8138.185.169.69
                                                Jan 15, 2025 03:00:51.026927948 CET44550044138.185.169.69192.168.2.8
                                                Jan 15, 2025 03:00:51.027019978 CET50044445192.168.2.8138.185.169.69
                                                Jan 15, 2025 03:00:51.027098894 CET50044445192.168.2.8138.185.169.69
                                                Jan 15, 2025 03:00:51.027264118 CET50045445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.032188892 CET44550045138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:00:51.032221079 CET44550044138.185.169.69192.168.2.8
                                                Jan 15, 2025 03:00:51.032288074 CET50044445192.168.2.8138.185.169.69
                                                Jan 15, 2025 03:00:51.032303095 CET50045445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.032354116 CET50045445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.032603979 CET50046445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.037403107 CET44550045138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:00:51.037457943 CET50045445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.037540913 CET44550046138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:00:51.037677050 CET50046445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.037707090 CET50046445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:00:51.042717934 CET44550046138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:00:51.880868912 CET50047445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:51.885767937 CET4455004735.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:51.885843039 CET50047445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:51.885870934 CET50047445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:00:51.890666008 CET4455004735.231.51.1192.168.2.8
                                                Jan 15, 2025 03:00:52.553272963 CET50048445192.168.2.8190.111.101.216
                                                Jan 15, 2025 03:00:52.558290005 CET44550048190.111.101.216192.168.2.8
                                                Jan 15, 2025 03:00:52.558402061 CET50048445192.168.2.8190.111.101.216
                                                Jan 15, 2025 03:00:52.558449984 CET50048445192.168.2.8190.111.101.216
                                                Jan 15, 2025 03:00:52.558676958 CET50049445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.563523054 CET44550048190.111.101.216192.168.2.8
                                                Jan 15, 2025 03:00:52.563541889 CET44550049190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:00:52.563601971 CET50048445192.168.2.8190.111.101.216
                                                Jan 15, 2025 03:00:52.563626051 CET50049445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.563730001 CET50049445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.564039946 CET50050445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.568576097 CET44550049190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:00:52.568684101 CET50049445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.568804979 CET44550050190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:00:52.568872929 CET50050445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.568907976 CET50050445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:00:52.573690891 CET44550050190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:00:52.916296005 CET44549955130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:52.916538000 CET49955445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:52.916594982 CET49955445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:52.916672945 CET49955445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:52.921652079 CET44549955130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:52.921695948 CET44549955130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:53.975416899 CET50051445192.168.2.844.101.207.103
                                                Jan 15, 2025 03:00:53.980267048 CET4455005144.101.207.103192.168.2.8
                                                Jan 15, 2025 03:00:53.980361938 CET50051445192.168.2.844.101.207.103
                                                Jan 15, 2025 03:00:53.980389118 CET50051445192.168.2.844.101.207.103
                                                Jan 15, 2025 03:00:53.980525017 CET50052445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.985415936 CET4455005144.101.207.103192.168.2.8
                                                Jan 15, 2025 03:00:53.985428095 CET4455005244.101.207.1192.168.2.8
                                                Jan 15, 2025 03:00:53.985610962 CET50051445192.168.2.844.101.207.103
                                                Jan 15, 2025 03:00:53.985657930 CET50052445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.986084938 CET50053445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.986092091 CET50052445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.991873980 CET4455005344.101.207.1192.168.2.8
                                                Jan 15, 2025 03:00:53.991944075 CET50053445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.991978884 CET50053445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.992319107 CET4455005244.101.207.1192.168.2.8
                                                Jan 15, 2025 03:00:53.992377996 CET50052445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:00:53.996797085 CET4455005344.101.207.1192.168.2.8
                                                Jan 15, 2025 03:00:54.912300110 CET44549980221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:54.912411928 CET49980445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:54.912499905 CET49980445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:54.912579060 CET49980445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:54.918828964 CET44549980221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:54.919894934 CET44549980221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:55.315182924 CET50054445192.168.2.8212.175.146.79
                                                Jan 15, 2025 03:00:55.320158005 CET44550054212.175.146.79192.168.2.8
                                                Jan 15, 2025 03:00:55.320240021 CET50054445192.168.2.8212.175.146.79
                                                Jan 15, 2025 03:00:55.320271015 CET50054445192.168.2.8212.175.146.79
                                                Jan 15, 2025 03:00:55.320414066 CET50055445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.326241016 CET44550055212.175.146.1192.168.2.8
                                                Jan 15, 2025 03:00:55.326318979 CET50055445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.326364040 CET50055445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.326410055 CET44550054212.175.146.79192.168.2.8
                                                Jan 15, 2025 03:00:55.326483011 CET50054445192.168.2.8212.175.146.79
                                                Jan 15, 2025 03:00:55.326713085 CET50056445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.333060026 CET44550055212.175.146.1192.168.2.8
                                                Jan 15, 2025 03:00:55.333106995 CET50055445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.334072113 CET44550056212.175.146.1192.168.2.8
                                                Jan 15, 2025 03:00:55.334139109 CET50056445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.334167004 CET50056445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:00:55.340318918 CET44550056212.175.146.1192.168.2.8
                                                Jan 15, 2025 03:00:55.927979946 CET50057445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:55.933024883 CET44550057130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:55.933156013 CET50057445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:55.933156013 CET50057445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:00:55.938040018 CET44550057130.176.180.1192.168.2.8
                                                Jan 15, 2025 03:00:56.553093910 CET50058445192.168.2.852.12.87.90
                                                Jan 15, 2025 03:00:56.558136940 CET4455005852.12.87.90192.168.2.8
                                                Jan 15, 2025 03:00:56.558260918 CET50058445192.168.2.852.12.87.90
                                                Jan 15, 2025 03:00:56.558337927 CET50058445192.168.2.852.12.87.90
                                                Jan 15, 2025 03:00:56.558528900 CET50059445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.563239098 CET4455005852.12.87.90192.168.2.8
                                                Jan 15, 2025 03:00:56.563306093 CET4455005952.12.87.1192.168.2.8
                                                Jan 15, 2025 03:00:56.563307047 CET50058445192.168.2.852.12.87.90
                                                Jan 15, 2025 03:00:56.563383102 CET50059445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.563435078 CET50059445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.563863993 CET50060445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.568348885 CET4455005952.12.87.1192.168.2.8
                                                Jan 15, 2025 03:00:56.568360090 CET4455005952.12.87.1192.168.2.8
                                                Jan 15, 2025 03:00:56.568398952 CET50059445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.568658113 CET4455006052.12.87.1192.168.2.8
                                                Jan 15, 2025 03:00:56.568722963 CET50060445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.568767071 CET50060445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:00:56.573565006 CET4455006052.12.87.1192.168.2.8
                                                Jan 15, 2025 03:00:56.927812099 CET44550006121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:56.927915096 CET50006445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:56.927961111 CET50006445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:56.928016901 CET50006445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:56.932753086 CET44550006121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:56.932804108 CET44550006121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:57.136693954 CET4455000918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:57.136843920 CET50009445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:57.136843920 CET50009445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:57.136991978 CET50009445192.168.2.818.65.28.1
                                                Jan 15, 2025 03:00:57.141683102 CET4455000918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:57.141771078 CET4455000918.65.28.1192.168.2.8
                                                Jan 15, 2025 03:00:57.193675995 CET50061445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.199068069 CET4455006118.65.28.2192.168.2.8
                                                Jan 15, 2025 03:00:57.199192047 CET50061445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.199213982 CET50061445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.199579954 CET50062445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.204188108 CET4455006118.65.28.2192.168.2.8
                                                Jan 15, 2025 03:00:57.204257011 CET50061445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.204447985 CET4455006218.65.28.2192.168.2.8
                                                Jan 15, 2025 03:00:57.204516888 CET50062445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.204544067 CET50062445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:00:57.209424019 CET4455006218.65.28.2192.168.2.8
                                                Jan 15, 2025 03:00:57.714267969 CET50063445192.168.2.880.11.64.201
                                                Jan 15, 2025 03:00:57.721048117 CET4455006380.11.64.201192.168.2.8
                                                Jan 15, 2025 03:00:57.721195936 CET50063445192.168.2.880.11.64.201
                                                Jan 15, 2025 03:00:57.721278906 CET50063445192.168.2.880.11.64.201
                                                Jan 15, 2025 03:00:57.721448898 CET50064445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.727829933 CET4455006380.11.64.201192.168.2.8
                                                Jan 15, 2025 03:00:57.727864027 CET4455006480.11.64.1192.168.2.8
                                                Jan 15, 2025 03:00:57.727909088 CET50063445192.168.2.880.11.64.201
                                                Jan 15, 2025 03:00:57.727957010 CET50064445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.728072882 CET50064445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.729880095 CET50065445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.734510899 CET4455006480.11.64.1192.168.2.8
                                                Jan 15, 2025 03:00:57.734572887 CET50064445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.736358881 CET4455006580.11.64.1192.168.2.8
                                                Jan 15, 2025 03:00:57.736449003 CET50065445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.737689972 CET50065445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:00:57.744168043 CET4455006580.11.64.1192.168.2.8
                                                Jan 15, 2025 03:00:57.927910089 CET50066445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:57.933166981 CET44550066221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:57.933336020 CET50066445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:57.933336973 CET50066445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:00:57.938431978 CET44550066221.124.139.1192.168.2.8
                                                Jan 15, 2025 03:00:58.803241014 CET50067445192.168.2.893.15.33.114
                                                Jan 15, 2025 03:00:58.808356047 CET4455006793.15.33.114192.168.2.8
                                                Jan 15, 2025 03:00:58.808455944 CET50067445192.168.2.893.15.33.114
                                                Jan 15, 2025 03:00:58.808557987 CET50067445192.168.2.893.15.33.114
                                                Jan 15, 2025 03:00:58.808780909 CET50068445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.813544035 CET4455006793.15.33.114192.168.2.8
                                                Jan 15, 2025 03:00:58.813616037 CET50067445192.168.2.893.15.33.114
                                                Jan 15, 2025 03:00:58.813674927 CET4455006893.15.33.1192.168.2.8
                                                Jan 15, 2025 03:00:58.813834906 CET50068445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.813834906 CET50068445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.814229965 CET50069445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.818934917 CET4455006893.15.33.1192.168.2.8
                                                Jan 15, 2025 03:00:58.818994999 CET50068445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.819087029 CET4455006993.15.33.1192.168.2.8
                                                Jan 15, 2025 03:00:58.819149971 CET50069445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.819190025 CET50069445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:00:58.823960066 CET4455006993.15.33.1192.168.2.8
                                                Jan 15, 2025 03:00:58.927262068 CET4455001592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:58.927335024 CET50015445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:58.927376032 CET50015445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:58.927418947 CET50015445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:00:58.932246923 CET4455001592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:58.932277918 CET4455001592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:00:59.115560055 CET4455001688.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:59.115685940 CET50016445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:59.115771055 CET50016445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:59.115863085 CET50016445192.168.2.888.189.60.1
                                                Jan 15, 2025 03:00:59.120600939 CET4455001688.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:59.120758057 CET4455001688.189.60.1192.168.2.8
                                                Jan 15, 2025 03:00:59.178072929 CET50070445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.183064938 CET4455007088.189.60.2192.168.2.8
                                                Jan 15, 2025 03:00:59.183178902 CET50070445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.183209896 CET50070445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.183731079 CET50071445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.188214064 CET4455007088.189.60.2192.168.2.8
                                                Jan 15, 2025 03:00:59.188282967 CET50070445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.188580036 CET4455007188.189.60.2192.168.2.8
                                                Jan 15, 2025 03:00:59.188682079 CET50071445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.188734055 CET50071445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:00:59.193742990 CET4455007188.189.60.2192.168.2.8
                                                Jan 15, 2025 03:00:59.818716049 CET50073445192.168.2.8212.145.160.56
                                                Jan 15, 2025 03:00:59.823627949 CET44550073212.145.160.56192.168.2.8
                                                Jan 15, 2025 03:00:59.823724031 CET50073445192.168.2.8212.145.160.56
                                                Jan 15, 2025 03:00:59.823748112 CET50073445192.168.2.8212.145.160.56
                                                Jan 15, 2025 03:00:59.823916912 CET50074445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.828686953 CET44550073212.145.160.56192.168.2.8
                                                Jan 15, 2025 03:00:59.828747034 CET44550074212.145.160.1192.168.2.8
                                                Jan 15, 2025 03:00:59.828767061 CET50073445192.168.2.8212.145.160.56
                                                Jan 15, 2025 03:00:59.828809977 CET50074445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.828881979 CET50074445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.829144955 CET50075445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.833760023 CET44550074212.145.160.1192.168.2.8
                                                Jan 15, 2025 03:00:59.833815098 CET50074445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.833946943 CET44550075212.145.160.1192.168.2.8
                                                Jan 15, 2025 03:00:59.834006071 CET50075445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.834110975 CET50075445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:00:59.838901043 CET44550075212.145.160.1192.168.2.8
                                                Jan 15, 2025 03:00:59.943550110 CET50076445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:59.949975967 CET44550076121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:00:59.950062037 CET50076445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:59.950102091 CET50076445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:00:59.955610991 CET44550076121.66.99.1192.168.2.8
                                                Jan 15, 2025 03:01:00.923805952 CET50077445192.168.2.8123.129.155.244
                                                Jan 15, 2025 03:01:00.928792953 CET44550077123.129.155.244192.168.2.8
                                                Jan 15, 2025 03:01:00.928963900 CET50077445192.168.2.8123.129.155.244
                                                Jan 15, 2025 03:01:00.928987026 CET50077445192.168.2.8123.129.155.244
                                                Jan 15, 2025 03:01:00.929208040 CET50078445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.934065104 CET44550077123.129.155.244192.168.2.8
                                                Jan 15, 2025 03:01:00.934077024 CET44550078123.129.155.1192.168.2.8
                                                Jan 15, 2025 03:01:00.934178114 CET50078445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.934218884 CET50077445192.168.2.8123.129.155.244
                                                Jan 15, 2025 03:01:00.934243917 CET50078445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.935794115 CET50079445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.939177036 CET44550078123.129.155.1192.168.2.8
                                                Jan 15, 2025 03:01:00.939228058 CET50078445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.940589905 CET44550079123.129.155.1192.168.2.8
                                                Jan 15, 2025 03:01:00.940669060 CET50079445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.940695047 CET50079445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:00.945455074 CET44550079123.129.155.1192.168.2.8
                                                Jan 15, 2025 03:01:00.961222887 CET4455001945.38.55.1192.168.2.8
                                                Jan 15, 2025 03:01:00.961293936 CET50019445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:00.961318970 CET50019445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:00.961354971 CET50019445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:00.966386080 CET4455001945.38.55.1192.168.2.8
                                                Jan 15, 2025 03:01:00.966401100 CET4455001945.38.55.1192.168.2.8
                                                Jan 15, 2025 03:01:01.193608046 CET4455002048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:01:01.193684101 CET50020445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:01:01.194258928 CET50020445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:01:01.194386959 CET50020445192.168.2.848.132.234.1
                                                Jan 15, 2025 03:01:01.199075937 CET4455002048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:01:01.199178934 CET4455002048.132.234.1192.168.2.8
                                                Jan 15, 2025 03:01:01.256257057 CET50080445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.261089087 CET4455008048.132.234.2192.168.2.8
                                                Jan 15, 2025 03:01:01.261161089 CET50080445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.261209965 CET50080445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.261672974 CET50081445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.266068935 CET4455008048.132.234.2192.168.2.8
                                                Jan 15, 2025 03:01:01.266127110 CET50080445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.266520023 CET4455008148.132.234.2192.168.2.8
                                                Jan 15, 2025 03:01:01.266582966 CET50081445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.266618967 CET50081445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:01.271405935 CET4455008148.132.234.2192.168.2.8
                                                Jan 15, 2025 03:01:01.772113085 CET50082445192.168.2.852.208.151.246
                                                Jan 15, 2025 03:01:01.777080059 CET4455008252.208.151.246192.168.2.8
                                                Jan 15, 2025 03:01:01.782649040 CET50082445192.168.2.852.208.151.246
                                                Jan 15, 2025 03:01:01.782687902 CET50082445192.168.2.852.208.151.246
                                                Jan 15, 2025 03:01:01.782883883 CET50083445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.787688971 CET4455008252.208.151.246192.168.2.8
                                                Jan 15, 2025 03:01:01.787703037 CET4455008352.208.151.1192.168.2.8
                                                Jan 15, 2025 03:01:01.787767887 CET50082445192.168.2.852.208.151.246
                                                Jan 15, 2025 03:01:01.787806034 CET50083445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.787900925 CET50083445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.788212061 CET50084445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.792783976 CET4455008352.208.151.1192.168.2.8
                                                Jan 15, 2025 03:01:01.793112040 CET4455008452.208.151.1192.168.2.8
                                                Jan 15, 2025 03:01:01.793169022 CET50083445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.793184996 CET50084445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.793211937 CET50084445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:01.798011065 CET4455008452.208.151.1192.168.2.8
                                                Jan 15, 2025 03:01:01.927901030 CET50085445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:01:01.933113098 CET4455008592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:01:01.934643030 CET50085445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:01:01.934689045 CET50085445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:01:01.939446926 CET4455008592.216.155.1192.168.2.8
                                                Jan 15, 2025 03:01:02.600248098 CET50086445192.168.2.8204.42.185.105
                                                Jan 15, 2025 03:01:02.605014086 CET44550086204.42.185.105192.168.2.8
                                                Jan 15, 2025 03:01:02.606632948 CET50086445192.168.2.8204.42.185.105
                                                Jan 15, 2025 03:01:02.606714964 CET50086445192.168.2.8204.42.185.105
                                                Jan 15, 2025 03:01:02.606893063 CET50087445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.611578941 CET44550086204.42.185.105192.168.2.8
                                                Jan 15, 2025 03:01:02.611627102 CET44550087204.42.185.1192.168.2.8
                                                Jan 15, 2025 03:01:02.611675978 CET50086445192.168.2.8204.42.185.105
                                                Jan 15, 2025 03:01:02.611713886 CET50087445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.611756086 CET50087445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.612032890 CET50088445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.616651058 CET44550087204.42.185.1192.168.2.8
                                                Jan 15, 2025 03:01:02.616868973 CET44550088204.42.185.1192.168.2.8
                                                Jan 15, 2025 03:01:02.616930962 CET50087445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.616971970 CET50088445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.617048025 CET50088445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:02.621864080 CET44550088204.42.185.1192.168.2.8
                                                Jan 15, 2025 03:01:02.992430925 CET44550023139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:01:02.992559910 CET50023445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:02.992600918 CET50023445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:02.992660046 CET50023445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:02.997397900 CET44550023139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:01:02.997409105 CET44550023139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:01:03.181862116 CET44550024185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:01:03.181942940 CET50024445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:01:03.182127953 CET50024445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:01:03.182194948 CET50024445192.168.2.8185.88.214.1
                                                Jan 15, 2025 03:01:03.187118053 CET44550024185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:01:03.187129021 CET44550024185.88.214.1192.168.2.8
                                                Jan 15, 2025 03:01:03.623836994 CET50089445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.628504038 CET50090445192.168.2.8164.203.238.166
                                                Jan 15, 2025 03:01:03.628712893 CET44550089185.88.214.2192.168.2.8
                                                Jan 15, 2025 03:01:03.628781080 CET50089445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.628838062 CET50089445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.629303932 CET50091445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.633343935 CET44550090164.203.238.166192.168.2.8
                                                Jan 15, 2025 03:01:03.633409023 CET50090445192.168.2.8164.203.238.166
                                                Jan 15, 2025 03:01:03.633479118 CET50090445192.168.2.8164.203.238.166
                                                Jan 15, 2025 03:01:03.633672953 CET50092445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.633969069 CET44550089185.88.214.2192.168.2.8
                                                Jan 15, 2025 03:01:03.634012938 CET50089445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.634527922 CET44550091185.88.214.2192.168.2.8
                                                Jan 15, 2025 03:01:03.634582996 CET50091445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.634610891 CET50091445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:03.638803005 CET44550090164.203.238.166192.168.2.8
                                                Jan 15, 2025 03:01:03.638814926 CET44550092164.203.238.1192.168.2.8
                                                Jan 15, 2025 03:01:03.638851881 CET50090445192.168.2.8164.203.238.166
                                                Jan 15, 2025 03:01:03.638891935 CET50092445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.638966084 CET50092445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.639338017 CET44550091185.88.214.2192.168.2.8
                                                Jan 15, 2025 03:01:03.639857054 CET50093445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.643798113 CET44550092164.203.238.1192.168.2.8
                                                Jan 15, 2025 03:01:03.643845081 CET50092445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.644733906 CET44550093164.203.238.1192.168.2.8
                                                Jan 15, 2025 03:01:03.644789934 CET50093445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.644840956 CET50093445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:03.649583101 CET44550093164.203.238.1192.168.2.8
                                                Jan 15, 2025 03:01:03.974951029 CET50094445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:03.981700897 CET4455009445.38.55.1192.168.2.8
                                                Jan 15, 2025 03:01:03.986702919 CET50094445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:03.986820936 CET50094445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:03.993108034 CET4455009445.38.55.1192.168.2.8
                                                Jan 15, 2025 03:01:04.975217104 CET44550028131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:01:04.975303888 CET50028445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:04.975367069 CET50028445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:04.975416899 CET50028445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:04.981503963 CET44550028131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:01:04.982609987 CET44550028131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:01:05.260432959 CET4455002957.106.150.1192.168.2.8
                                                Jan 15, 2025 03:01:05.260526896 CET50029445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:01:05.260642052 CET50029445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:01:05.260713100 CET50029445192.168.2.857.106.150.1
                                                Jan 15, 2025 03:01:05.265963078 CET4455002957.106.150.1192.168.2.8
                                                Jan 15, 2025 03:01:05.265995026 CET4455002957.106.150.1192.168.2.8
                                                Jan 15, 2025 03:01:05.319214106 CET50097445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.324635029 CET4455009757.106.150.2192.168.2.8
                                                Jan 15, 2025 03:01:05.324879885 CET50097445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.324944019 CET50097445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.325385094 CET50098445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.330121994 CET4455009757.106.150.2192.168.2.8
                                                Jan 15, 2025 03:01:05.330216885 CET50097445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.330439091 CET4455009857.106.150.2192.168.2.8
                                                Jan 15, 2025 03:01:05.330513000 CET50098445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.330563068 CET50098445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:05.335371971 CET4455009857.106.150.2192.168.2.8
                                                Jan 15, 2025 03:01:05.378195047 CET44550031220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:01:05.378323078 CET50031445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:05.378372908 CET50031445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:05.378405094 CET50031445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:05.383600950 CET44550031220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:01:05.383610964 CET44550031220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:01:06.006063938 CET50101445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:06.013459921 CET44550101139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:01:06.013613939 CET50101445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:06.013659954 CET50101445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:06.021281004 CET44550101139.64.238.1192.168.2.8
                                                Jan 15, 2025 03:01:06.990046978 CET44550034153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:01:06.990196943 CET50034445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:06.990251064 CET50034445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:06.990298986 CET50034445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:06.995023012 CET44550034153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:01:06.995085955 CET44550034153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:01:07.257991076 CET44550035144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:01:07.258075953 CET50035445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:01:07.258147955 CET50035445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:01:07.258217096 CET50035445192.168.2.8144.240.93.1
                                                Jan 15, 2025 03:01:07.262950897 CET44550035144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:01:07.263020039 CET44550035144.240.93.1192.168.2.8
                                                Jan 15, 2025 03:01:07.318736076 CET50109445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.323596954 CET44550109144.240.93.2192.168.2.8
                                                Jan 15, 2025 03:01:07.323878050 CET50109445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.323878050 CET50109445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.324117899 CET50110445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.328934908 CET44550110144.240.93.2192.168.2.8
                                                Jan 15, 2025 03:01:07.328946114 CET44550109144.240.93.2192.168.2.8
                                                Jan 15, 2025 03:01:07.329015970 CET50109445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.329029083 CET50110445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.329041958 CET50110445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:07.333802938 CET44550110144.240.93.2192.168.2.8
                                                Jan 15, 2025 03:01:07.990324974 CET50116445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:07.995487928 CET44550116131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:01:07.995605946 CET50116445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:07.995651007 CET50116445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:08.000448942 CET44550116131.170.148.1192.168.2.8
                                                Jan 15, 2025 03:01:08.381292105 CET50119445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:08.387330055 CET44550119220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:01:08.387428045 CET50119445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:08.387471914 CET50119445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:08.392301083 CET44550119220.130.244.3192.168.2.8
                                                Jan 15, 2025 03:01:08.850636959 CET44550038162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:01:08.850759983 CET50038445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:08.850805998 CET50038445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:08.850836039 CET50038445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:08.855628967 CET44550038162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:01:08.855639935 CET44550038162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:01:09.240585089 CET4455003955.183.182.1192.168.2.8
                                                Jan 15, 2025 03:01:09.240746021 CET50039445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:01:09.241681099 CET50039445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:01:09.241714954 CET50039445192.168.2.855.183.182.1
                                                Jan 15, 2025 03:01:09.246566057 CET4455003955.183.182.1192.168.2.8
                                                Jan 15, 2025 03:01:09.246584892 CET4455003955.183.182.1192.168.2.8
                                                Jan 15, 2025 03:01:09.303014040 CET50128445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.308010101 CET4455012855.183.182.2192.168.2.8
                                                Jan 15, 2025 03:01:09.308108091 CET50128445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.308176041 CET50128445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.308515072 CET50129445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.313256979 CET4455012855.183.182.2192.168.2.8
                                                Jan 15, 2025 03:01:09.313322067 CET50128445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.313342094 CET4455012955.183.182.2192.168.2.8
                                                Jan 15, 2025 03:01:09.313446045 CET50129445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.313484907 CET50129445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:09.318286896 CET4455012955.183.182.2192.168.2.8
                                                Jan 15, 2025 03:01:10.006058931 CET50138445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:10.011127949 CET44550138153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:01:10.011284113 CET50138445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:10.011341095 CET50138445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:10.214638948 CET44550138153.18.105.1192.168.2.8
                                                Jan 15, 2025 03:01:10.787939072 CET44550042218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:01:10.788021088 CET50042445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:10.788108110 CET50042445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:10.788173914 CET50042445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:10.792901993 CET44550042218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:01:10.792943001 CET44550042218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:01:11.261301041 CET44550043181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:01:11.261428118 CET50043445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:01:11.261512041 CET50043445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:01:11.261569023 CET50043445192.168.2.8181.27.172.1
                                                Jan 15, 2025 03:01:11.266450882 CET44550043181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:01:11.266699076 CET44550043181.27.172.1192.168.2.8
                                                Jan 15, 2025 03:01:11.318641901 CET50161445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.323611021 CET44550161181.27.172.2192.168.2.8
                                                Jan 15, 2025 03:01:11.323751926 CET50161445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.323751926 CET50161445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.324120998 CET50162445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.329124928 CET44550161181.27.172.2192.168.2.8
                                                Jan 15, 2025 03:01:11.329190969 CET50161445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.329253912 CET44550162181.27.172.2192.168.2.8
                                                Jan 15, 2025 03:01:11.329319954 CET50162445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.329386950 CET50162445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:11.334383011 CET44550162181.27.172.2192.168.2.8
                                                Jan 15, 2025 03:01:11.865432978 CET50172445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:11.870424032 CET44550172162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:01:11.870567083 CET50172445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:11.870590925 CET50172445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:11.875566006 CET44550172162.93.115.1192.168.2.8
                                                Jan 15, 2025 03:01:12.414784908 CET44550046138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:01:12.414938927 CET50046445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:01:12.414983034 CET50046445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:01:12.415035963 CET50046445192.168.2.8138.185.169.1
                                                Jan 15, 2025 03:01:12.424866915 CET44550046138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:01:12.424882889 CET44550046138.185.169.1192.168.2.8
                                                Jan 15, 2025 03:01:13.245038033 CET4455004735.231.51.1192.168.2.8
                                                Jan 15, 2025 03:01:13.245115042 CET50047445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:01:13.245152950 CET50047445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:01:13.245191097 CET50047445192.168.2.835.231.51.1
                                                Jan 15, 2025 03:01:13.250471115 CET4455004735.231.51.1192.168.2.8
                                                Jan 15, 2025 03:01:13.250489950 CET4455004735.231.51.1192.168.2.8
                                                Jan 15, 2025 03:01:13.303363085 CET50210445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.309052944 CET4455021035.231.51.2192.168.2.8
                                                Jan 15, 2025 03:01:13.309125900 CET50210445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.309267998 CET50210445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.309761047 CET50211445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.315702915 CET4455021035.231.51.2192.168.2.8
                                                Jan 15, 2025 03:01:13.315759897 CET50210445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.316179991 CET4455021135.231.51.2192.168.2.8
                                                Jan 15, 2025 03:01:13.316250086 CET50211445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.316287994 CET50211445192.168.2.835.231.51.2
                                                Jan 15, 2025 03:01:13.322175980 CET4455021135.231.51.2192.168.2.8
                                                Jan 15, 2025 03:01:13.802866936 CET50229445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:13.809509039 CET44550229218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:01:13.809689045 CET50229445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:13.809740067 CET50229445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:13.814584017 CET44550229218.91.200.1192.168.2.8
                                                Jan 15, 2025 03:01:13.943495035 CET44550050190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:01:13.943587065 CET50050445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:01:13.943638086 CET50050445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:01:13.943686962 CET50050445192.168.2.8190.111.101.1
                                                Jan 15, 2025 03:01:13.948509932 CET44550050190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:01:13.948519945 CET44550050190.111.101.1192.168.2.8
                                                Jan 15, 2025 03:01:15.367835045 CET4455005344.101.207.1192.168.2.8
                                                Jan 15, 2025 03:01:15.367937088 CET50053445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:01:16.145180941 CET50062445192.168.2.818.65.28.2
                                                Jan 15, 2025 03:01:16.145219088 CET50081445192.168.2.848.132.234.2
                                                Jan 15, 2025 03:01:16.145323038 CET50172445192.168.2.8162.93.115.1
                                                Jan 15, 2025 03:01:16.145370007 CET50138445192.168.2.8153.18.105.1
                                                Jan 15, 2025 03:01:16.145397902 CET50110445192.168.2.8144.240.93.2
                                                Jan 15, 2025 03:01:16.145440102 CET50129445192.168.2.855.183.182.2
                                                Jan 15, 2025 03:01:16.145442963 CET50098445192.168.2.857.106.150.2
                                                Jan 15, 2025 03:01:16.145575047 CET50053445192.168.2.844.101.207.1
                                                Jan 15, 2025 03:01:16.145597935 CET50066445192.168.2.8221.124.139.1
                                                Jan 15, 2025 03:01:16.145612955 CET50056445192.168.2.8212.175.146.1
                                                Jan 15, 2025 03:01:16.145618916 CET50116445192.168.2.8131.170.148.1
                                                Jan 15, 2025 03:01:16.145618916 CET50071445192.168.2.888.189.60.2
                                                Jan 15, 2025 03:01:16.145627022 CET50057445192.168.2.8130.176.180.1
                                                Jan 15, 2025 03:01:16.145654917 CET50060445192.168.2.852.12.87.1
                                                Jan 15, 2025 03:01:16.145672083 CET50065445192.168.2.880.11.64.1
                                                Jan 15, 2025 03:01:16.145709038 CET50069445192.168.2.893.15.33.1
                                                Jan 15, 2025 03:01:16.145731926 CET50075445192.168.2.8212.145.160.1
                                                Jan 15, 2025 03:01:16.145752907 CET50076445192.168.2.8121.66.99.1
                                                Jan 15, 2025 03:01:16.145797014 CET50079445192.168.2.8123.129.155.1
                                                Jan 15, 2025 03:01:16.145807981 CET50084445192.168.2.852.208.151.1
                                                Jan 15, 2025 03:01:16.145827055 CET50085445192.168.2.892.216.155.1
                                                Jan 15, 2025 03:01:16.145859957 CET50088445192.168.2.8204.42.185.1
                                                Jan 15, 2025 03:01:16.145879984 CET50091445192.168.2.8185.88.214.2
                                                Jan 15, 2025 03:01:16.145909071 CET50093445192.168.2.8164.203.238.1
                                                Jan 15, 2025 03:01:16.145946026 CET50094445192.168.2.845.38.55.1
                                                Jan 15, 2025 03:01:16.145961046 CET50101445192.168.2.8139.64.238.1
                                                Jan 15, 2025 03:01:16.146063089 CET50119445192.168.2.8220.130.244.3
                                                Jan 15, 2025 03:01:16.146064997 CET50162445192.168.2.8181.27.172.2
                                                Jan 15, 2025 03:01:16.146121025 CET50229445192.168.2.8218.91.200.1
                                                Jan 15, 2025 03:01:16.146176100 CET50211445192.168.2.835.231.51.2
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 15, 2025 03:00:09.737533092 CET5665053192.168.2.81.1.1.1
                                                Jan 15, 2025 03:00:09.745382071 CET53566501.1.1.1192.168.2.8
                                                Jan 15, 2025 03:00:49.088282108 CET138138192.168.2.8192.168.2.255
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 15, 2025 03:00:09.737533092 CET192.168.2.81.1.1.10xef91Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 15, 2025 03:00:09.745382071 CET1.1.1.1192.168.2.80xef91No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:09.745382071 CET1.1.1.1192.168.2.80xef91No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:00:21.101284027 CET1.1.1.1192.168.2.80xc93eNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:01:24.291539907 CET1.1.1.1192.168.2.80xfe5fNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                Jan 15, 2025 03:01:24.291539907 CET1.1.1.1192.168.2.80xfe5fNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.849705104.16.167.228804568C:\Windows\mssecsvc.exe
                                                TimestampBytes transferredDirectionData
                                                Jan 15, 2025 03:00:09.756155014 CET100OUTGET / HTTP/1.1
                                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                Cache-Control: no-cache
                                                Jan 15, 2025 03:00:10.265729904 CET778INHTTP/1.1 200 OK
                                                Date: Wed, 15 Jan 2025 02:00:10 GMT
                                                Content-Type: text/html
                                                Content-Length: 607
                                                Connection: close
                                                Server: cloudflare
                                                CF-RAY: 902245478f93c35f-EWR
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.849706104.16.167.228806704C:\Windows\mssecsvc.exe
                                                TimestampBytes transferredDirectionData
                                                Jan 15, 2025 03:00:10.796967030 CET100OUTGET / HTTP/1.1
                                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                Cache-Control: no-cache
                                                Jan 15, 2025 03:00:11.270590067 CET778INHTTP/1.1 200 OK
                                                Date: Wed, 15 Jan 2025 02:00:11 GMT
                                                Content-Type: text/html
                                                Content-Length: 607
                                                Connection: close
                                                Server: cloudflare
                                                CF-RAY: 9022454e0b8cc34b-EWR
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.849723104.16.167.228803776C:\Windows\mssecsvc.exe
                                                TimestampBytes transferredDirectionData
                                                Jan 15, 2025 03:00:12.289781094 CET100OUTGET / HTTP/1.1
                                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                Cache-Control: no-cache
                                                Jan 15, 2025 03:00:12.776971102 CET778INHTTP/1.1 200 OK
                                                Date: Wed, 15 Jan 2025 02:00:12 GMT
                                                Content-Type: text/html
                                                Content-Length: 607
                                                Connection: close
                                                Server: cloudflare
                                                CF-RAY: 902245576fc70f88-EWR
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:21:00:07
                                                Start date:14/01/2025
                                                Path:C:\Windows\System32\loaddll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:loaddll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll"
                                                Imagebase:0x40000
                                                File size:126'464 bytes
                                                MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:1
                                                Start time:21:00:07
                                                Start date:14/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6ee680000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:21:00:07
                                                Start date:14/01/2025
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1
                                                Imagebase:0xa40000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:21:00:07
                                                Start date:14/01/2025
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\wmnq39xe8J.dll,PlayGame
                                                Imagebase:0x650000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:21:00:07
                                                Start date:14/01/2025
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",#1
                                                Imagebase:0x650000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:21:00:07
                                                Start date:14/01/2025
                                                Path:C:\Windows\mssecsvc.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\WINDOWS\mssecsvc.exe
                                                Imagebase:0x400000
                                                File size:3'723'264 bytes
                                                MD5 hash:E676BB073144D631575F56DF2FAE4CE8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1463899267.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1463529134.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                                • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 95%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:8
                                                Start time:21:00:09
                                                Start date:14/01/2025
                                                Path:C:\Windows\mssecsvc.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                                Imagebase:0x400000
                                                File size:3'723'264 bytes
                                                MD5 hash:E676BB073144D631575F56DF2FAE4CE8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2126929660.0000000001EB6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2126929660.0000000001EB6000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1478922170.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1478922170.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2127224243.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2127224243.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1478402314.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                Reputation:low
                                                Has exited:true

                                                Target ID:9
                                                Start time:21:00:10
                                                Start date:14/01/2025
                                                Path:C:\Windows\tasksche.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\WINDOWS\tasksche.exe /i
                                                Imagebase:0x400000
                                                File size:3'514'368 bytes
                                                MD5 hash:CE950EA6E27D1637EF799EDA580C8073
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1486209534.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 93%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:10
                                                Start time:21:00:10
                                                Start date:14/01/2025
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\wmnq39xe8J.dll",PlayGame
                                                Imagebase:0x650000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:11
                                                Start time:21:00:10
                                                Start date:14/01/2025
                                                Path:C:\Windows\mssecsvc.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\WINDOWS\mssecsvc.exe
                                                Imagebase:0x400000
                                                File size:3'723'264 bytes
                                                MD5 hash:E676BB073144D631575F56DF2FAE4CE8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1490992989.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1502106074.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1491258408.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1491258408.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1502245261.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1502245261.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                Reputation:low
                                                Has exited:true

                                                Target ID:12
                                                Start time:21:00:11
                                                Start date:14/01/2025
                                                Path:C:\Windows\tasksche.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\WINDOWS\tasksche.exe /i
                                                Imagebase:0x400000
                                                File size:3'514'368 bytes
                                                MD5 hash:CE950EA6E27D1637EF799EDA580C8073
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1501621099.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1500941741.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                Reputation:low
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:71.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:63.2%
                                                  Total number of Nodes:38
                                                  Total number of Limit Nodes:9
                                                  execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                                  Callgraph

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FAF0EF0,?,00000000), ref: 00407CEF
                                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                  • sprintf.MSVCRT ref: 00407E01
                                                  • sprintf.MSVCRT ref: 00407E18
                                                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                  • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                  • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                  • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                  • CreateProcessA.KERNELBASE ref: 00407EE8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                  • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1487309913.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.1487270658.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487335382.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487429399.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                  • API String ID: 4281112323-1507730452
                                                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1487309913.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.1487270658.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487335382.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487429399.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                  • String ID:
                                                  • API String ID: 801014965-0
                                                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                  Control-flow Graph

                                                  APIs
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                  Strings
                                                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1487309913.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.1487270658.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487335382.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487429399.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                  • API String ID: 774561529-2942426231
                                                  • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                  • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                  • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                  • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                  Control-flow Graph

                                                  APIs
                                                  • sprintf.MSVCRT ref: 00407C56
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FAF0EF0,00000000), ref: 00407C9B
                                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1487309913.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.1487270658.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487335382.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487429399.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                  • API String ID: 3340711343-4063779371
                                                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                  • __p___argc.MSVCRT ref: 004080A5
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FAF0EF0,00000000,?,004081B2), ref: 004080DC
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1487309913.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.1487270658.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487335382.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487382940.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487429399.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.1487521245.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                  • String ID: mssecsvc2.0
                                                  • API String ID: 4274534310-3729025388
                                                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                  Execution Graph

                                                  Execution Coverage:34.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:36
                                                  Total number of Limit Nodes:2

                                                  Callgraph

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                  • __p___argc.MSVCRT ref: 004080A5
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FAF0EF0,00000000,?,004081B2), ref: 004080DC
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2126030011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.2126012475.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126046646.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126115565.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126129765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                  • String ID: mssecsvc2.0
                                                  • API String ID: 4274534310-3729025388
                                                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                  Control-flow Graph

                                                  APIs
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                  Strings
                                                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2126030011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.2126012475.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126046646.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126115565.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126129765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                  • API String ID: 774561529-2942426231
                                                  • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                  • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                  • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                  • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                  Control-flow Graph

                                                  APIs
                                                  • sprintf.MSVCRT ref: 00407C56
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FAF0EF0,00000000), ref: 00407C9B
                                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2126030011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.2126012475.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126046646.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126115565.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126129765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                  • API String ID: 3340711343-4063779371
                                                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FAF0EF0,?,00000000), ref: 00407CEF
                                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                  • sprintf.MSVCRT ref: 00407E01
                                                  • sprintf.MSVCRT ref: 00407E18
                                                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2126030011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.2126012475.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126046646.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126115565.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126129765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                  • API String ID: 4072214828-1507730452
                                                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2126030011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.2126012475.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126046646.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126062277.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126101344.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126115565.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126129765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000008.00000002.2126212577.00000000008B8000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                  • String ID:
                                                  • API String ID: 801014965-0
                                                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                                  APIs
                                                  • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: /../$/..\$\../$\..\
                                                  • API String ID: 3510742995-3885502717
                                                  • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                  • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                                  • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                  • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                  • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                  • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                  • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                  • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                  • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                  • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                                  • API String ID: 2238633743-2459060434
                                                  • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                  • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                                  • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                  • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                                  APIs
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                                  • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandleOpen$ManagerStart
                                                  • String ID: cmd.exe /c "%s"
                                                  • API String ID: 1485051382-955883872
                                                  • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                  • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                                  • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                  • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                                  APIs
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                                  • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                                  • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??0exception@@ExceptionThrow$memcpy
                                                  • String ID:
                                                  • API String ID: 1881450474-3916222277
                                                  • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                  • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                                  • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                  • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                                  APIs
                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                                  • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                                  • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                                  • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                                  • String ID: WANACRY!
                                                  • API String ID: 283026544-1240840912
                                                  • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                  • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                                  • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                  • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                                  APIs
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                                  • String ID: $Q;@
                                                  • API String ID: 2382887404-262343263
                                                  • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                  • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                                  • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                  • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                                  APIs
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                                  • String ID:
                                                  • API String ID: 2382887404-3916222277
                                                  • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                  • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                                  • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                  • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                                  APIs
                                                  • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$FreeProcessfree
                                                  • String ID:
                                                  • API String ID: 3428986607-0
                                                  • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                  • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                                  • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                  • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                                  APIs
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??0exception@@ExceptionThrow
                                                  • String ID:
                                                  • API String ID: 941485209-0
                                                  • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                  • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                                  • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                  • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                                  APIs
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??0exception@@ExceptionThrow
                                                  • String ID:
                                                  • API String ID: 941485209-0
                                                  • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                  • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                                  • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                  • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID:
                                                  • API String ID: 3510742995-0
                                                  • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                  • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                                  • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                  • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                                  APIs
                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ContextCryptRelease
                                                  • String ID:
                                                  • API String ID: 829835001-0
                                                  • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                  • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                                  • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                  • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                  • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                                  • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                  • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                  • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                                  • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                  • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                                  APIs
                                                    • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                                  • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                                  • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                                  • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                                  • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                                  • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                                  • API String ID: 2238633743-1294736154
                                                  • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                  • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                                  • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                  • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %s%s$%s%s%s$:$\
                                                  • API String ID: 0-1100577047
                                                  • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                  • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                                  • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                  • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                                  APIs
                                                  • __p___argv.MSVCRT(0040F538), ref: 00402040
                                                  • strcmp.MSVCRT(?), ref: 0040204B
                                                  • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                                  • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                    • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                                  • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                                  • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                                  • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                                    • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                    • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                    • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                    • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                                  • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                                  • API String ID: 1074704982-2844324180
                                                  • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                  • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                                  • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                  • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                                  APIs
                                                  • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                                  • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                                  • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                                  • strlen.MSVCRT(?), ref: 004011A7
                                                  • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                                  • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                                  • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                                  • String ID: 0@$Software\$WanaCrypt0r
                                                  • API String ID: 865909632-3421300005
                                                  • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                  • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                                  • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                  • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                  • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                  • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                  • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                                  • String ID: %s\Intel$%s\ProgramData
                                                  • API String ID: 3806094219-198707228
                                                  • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                  • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                                  • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                  • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                                  APIs
                                                    • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                                  • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                                  • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                                  • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                                    • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                                  • SetLastError.KERNEL32(0000045A), ref: 00402430
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                                  • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                                  • API String ID: 1900561814-3657104962
                                                  • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                  • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                                  • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                  • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                  • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                                  • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                                  • String ID: %s\%s
                                                  • API String ID: 1036847564-4073750446
                                                  • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                  • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                                  • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                  • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                                  APIs
                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                                  • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                                  • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                                  • CloseHandle.KERNEL32(?), ref: 004010EC
                                                  • CloseHandle.KERNEL32(?), ref: 004010F1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                                  • String ID: D
                                                  • API String ID: 786732093-2746444292
                                                  • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                  • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                                  • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                  • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                                  APIs
                                                  • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                                  • __p__fmode.MSVCRT ref: 004077FC
                                                  • __p__commode.MSVCRT ref: 0040780A
                                                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                                  • String ID:
                                                  • API String ID: 3626615345-0
                                                  • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                  • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                                  • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                  • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                                  APIs
                                                  • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                    • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                  • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                                  • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                                  • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                                  • String ID:
                                                  • API String ID: 2141228402-0
                                                  • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                  • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                                  • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                  • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                                  APIs
                                                  • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                                  • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                                  • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Read$realloc
                                                  • String ID: ?!@
                                                  • API String ID: 1241503663-708128716
                                                  • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                  • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                                  • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                  • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: rand$wcslen$ComputerNamesrand
                                                  • String ID:
                                                  • API String ID: 3058258771-0
                                                  • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                  • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                                  • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                  • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                                  APIs
                                                  • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                                  • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                                  • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                                  • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                                  • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                                  • String ID:
                                                  • API String ID: 2935503933-0
                                                  • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                  • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                                  • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                  • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                                  APIs
                                                  • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                                  • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                                  • Sleep.KERNEL32(000003E8), ref: 00401F40
                                                  • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleMutexOpenSleepsprintf
                                                  • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                                  • API String ID: 2780352083-2959021817
                                                  • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                  • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                                  • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                  • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                                  APIs
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                                  • String ID:
                                                  • API String ID: 2382887404-0
                                                  • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                  • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                                  • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                  • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                                  APIs
                                                  • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                                  • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                                  • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                                  • fclose.MSVCRT(00000000), ref: 00401058
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: fclosefopenfreadfwrite
                                                  • String ID: c.wnry
                                                  • API String ID: 4000964834-3240288721
                                                  • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                  • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                                  • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                  • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                                  APIs
                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                                  • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                                  • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                                  • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                                  • String ID:
                                                  • API String ID: 2811923685-0
                                                  • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                  • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                                  • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                  • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                                  APIs
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                                  • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Pointer$??2@Create
                                                  • String ID:
                                                  • API String ID: 1331958074-0
                                                  • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                  • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                                  • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                  • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                                  APIs
                                                  • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                                  • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_stricmp
                                                  • String ID: P!@
                                                  • API String ID: 1278613211-1774101457
                                                  • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                  • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                                  • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                  • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                                  APIs
                                                  • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                                  • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesFilestrcmp
                                                  • String ID: c.wnry
                                                  • API String ID: 3324900478-3240288721
                                                  • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                  • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                                  • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                  • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                                  APIs
                                                  • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??3@CloseHandle
                                                  • String ID: $l@
                                                  • API String ID: 3816424416-2140230165
                                                  • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                  • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                                  • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                  • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                                  APIs
                                                  • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                                  • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.1486757357.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000009.00000002.1486730023.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486783768.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486805387.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  • Associated: 00000009.00000002.1486834228.00000000005A8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$Leave$Entermemcpy
                                                  • String ID:
                                                  • API String ID: 3435569088-0
                                                  • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                  • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                                  • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                  • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65