Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xjljKPlxqO.dll

Overview

General Information

Sample name:xjljKPlxqO.dll
renamed because original name is a hash value
Original sample name:3860bdea429da898e48421ae950340ee.dll
Analysis ID:1591534
MD5:3860bdea429da898e48421ae950340ee
SHA1:26e695bc874cb9b608099e1bf4d6b17e915a281c
SHA256:0590144053b6c24937a6ad1a34186edcddb16442b941eac553081d583a51e754
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7648 cmdline: loaddll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7704 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7736 cmdline: rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7788 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 96236BE68E3F6B6711717EE2516BC8EF)
          • tasksche.exe (PID: 7964 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 938C8405B0CCF0BA9635BB444CEC105D)
    • rundll32.exe (PID: 7716 cmdline: rundll32.exe C:\Users\user\Desktop\xjljKPlxqO.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8032 cmdline: rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 8048 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 96236BE68E3F6B6711717EE2516BC8EF)
        • tasksche.exe (PID: 8140 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 938C8405B0CCF0BA9635BB444CEC105D)
  • mssecsvc.exe (PID: 7888 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 96236BE68E3F6B6711717EE2516BC8EF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
xjljKPlxqO.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    xjljKPlxqO.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    xjljKPlxqO.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000C.00000000.1384126735.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000006.00000000.1344941761.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000009.00000000.1363779219.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            8.2.mssecsvc.exe.23fb8c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            8.2.mssecsvc.exe.1ed0084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            11.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              11.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              11.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.637268+010020315153Misc activity104.16.167.22880192.168.2.949728TCP
              2025-01-15T03:00:06.281879+010020315153Misc activity104.16.167.22880192.168.2.949733TCP
              2025-01-15T03:00:08.286938+010020315153Misc activity104.16.167.22880192.168.2.949760TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.155147+010020242911A Network Trojan was detected192.168.2.9563541.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.637070+010020242981A Network Trojan was detected192.168.2.949728104.16.167.22880TCP
              2025-01-15T03:00:06.281431+010020242981A Network Trojan was detected192.168.2.949733104.16.167.22880TCP
              2025-01-15T03:00:08.286484+010020242981A Network Trojan was detected192.168.2.949760104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.637070+010020242991A Network Trojan was detected192.168.2.949728104.16.167.22880TCP
              2025-01-15T03:00:06.281431+010020242991A Network Trojan was detected192.168.2.949733104.16.167.22880TCP
              2025-01-15T03:00:08.286484+010020242991A Network Trojan was detected192.168.2.949760104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.637070+010020243011A Network Trojan was detected192.168.2.949728104.16.167.22880TCP
              2025-01-15T03:00:06.281431+010020243011A Network Trojan was detected192.168.2.949733104.16.167.22880TCP
              2025-01-15T03:00:08.286484+010020243011A Network Trojan was detected192.168.2.949760104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.637070+010020243021A Network Trojan was detected192.168.2.949728104.16.167.22880TCP
              2025-01-15T03:00:06.281431+010020243021A Network Trojan was detected192.168.2.949733104.16.167.22880TCP
              2025-01-15T03:00:08.286484+010020243021A Network Trojan was detected192.168.2.949760104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:00:05.637070+010028033043Unknown Traffic192.168.2.949728104.16.167.22880TCP
              2025-01-15T03:00:06.281431+010028033043Unknown Traffic192.168.2.949733104.16.167.22880TCP
              2025-01-15T03:00:08.286484+010028033043Unknown Traffic192.168.2.949760104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: xjljKPlxqO.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 95%
              Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 93%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 95%
              Source: xjljKPlxqO.dllVirustotal: Detection: 92%Perma Link
              Source: xjljKPlxqO.dllReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
              Source: xjljKPlxqO.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: xjljKPlxqO.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.9:49733 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.9:49733 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.9:49733 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.9:49733 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.9:49728 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.9:49760 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.9:49760 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.9:49728 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.9:49760 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.9:49760 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.9:49728 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.9:49728 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:05 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022452ad8ccef9d-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:06 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022452ed93b4291-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:00:08 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022453b5ab58c7d-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49728 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49760 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.9:56354 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49733 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.9:49760
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.9:49733
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.9:49728
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.21
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.21
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.21
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.21
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 39.14.91.1
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.99
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.99
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.99
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.99
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 186.236.250.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.29
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.29
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.29
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.29
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 116.25.141.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
              Source: unknownTCP traffic detected without corresponding DNS query: 137.156.254.229
              Source: unknownTCP traffic detected without corresponding DNS query: 137.156.254.229
              Source: unknownTCP traffic detected without corresponding DNS query: 137.156.254.229
              Source: unknownTCP traffic detected without corresponding DNS query: 137.156.254.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004790424.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1363324729.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D27000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/-
              Source: mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/h
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
              Source: mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com8
              Source: mssecsvc.exe, 00000008.00000002.2003978964.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
              Source: Yara matchFile source: xjljKPlxqO.dll, type: SAMPLE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23fb8c8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.240a948.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1edb0a4.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.24068e8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1edf104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1344941761.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1372763322.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1356426068.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1385236492.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1372940689.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1345317015.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1356558525.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7788, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7888, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
              Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

              System Summary

              barindex
              Source: xjljKPlxqO.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: xjljKPlxqO.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.23fb8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ed0084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23fb8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23fb8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.240a948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.240a948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1edb0a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1edb0a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.24068e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.24068e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1edf104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1edf104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 0000000C.00000000.1384126735.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1363779219.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000002.1384725857.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.1372940689.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1345317015.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.1356558525.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
              Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: xjljKPlxqO.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: xjljKPlxqO.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: xjljKPlxqO.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.23fb8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ed0084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1f02128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1edf104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.242d96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1f02128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23fb8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23fb8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1ed0084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.240a948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.240a948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.240a948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1edb0a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1edb0a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.24068e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.24068e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1edf104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1edf104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.242d96c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000000C.00000000.1384126735.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1363779219.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000002.1384725857.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.1372940689.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1345317015.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.1356558525.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-LocalPack-RU-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat\Wh
              Source: mssecsvc.exe.4.drBinary string: C\Device\HarddiskVolume2\Windows\SoftwareDistribution\DataStore\Logs
              Source: mssecsvc.exe.4.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\catroot2\edb.logp
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\usbohci.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-RemoteApplications-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: 7\Device\HarddiskVolume2\Windows\System32\CertPolEng.dll A
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\usbprint.sysp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\parvdm.sysAUH
              Source: mssecsvc.exe.4.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\drivers\fdc.sysm
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\GAGP30KX.SYS
              Source: mssecsvc.exe.4.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\QAGENTRT.DLL
              Source: mssecsvc.exe.4.drBinary string: 1\Device\HarddiskVolume2\Windows\ehome\ehrecvr.exe
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Cachesp
              Source: mssecsvc.exe.4.drBinary string: \\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\crcdisk.sysp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IE-Troubleshooters-Package-wrapper~31bf3856ad364e35~x86~en-US~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\dmvsc.sysd
              Source: mssecsvc.exe.4.drBinary string: f\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History-38:
              Source: mssecsvc.exe.4.drBinary string: V\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-StickyNotes-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-WindowsFoundation-LanguagePack-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_for_KB2534111~31bf3856ad364e35~x86~~6.1.1.0.catdop
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\NV_AGP.SYS
              Source: mssecsvc.exe.4.drBinary string: \Device\CdRom0PchSmi
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\volsnap.inf_loc
              Source: mssecsvc.exe.4.drBinary string: h\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-LanguagePack-Package-wrapper~31bf3856ad364e35~x86~en-US~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\mapi32.dll
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\monitor.inf_loc
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr003.catp
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\mskssrv.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RDC-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr002.cat.p
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\storvsc.sys,
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\MTConfig.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NetworkDiagnostics-DirectAccessEntry-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: n\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RasRip-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\sppsvc.exeI
              Source: mssecsvc.exe.4.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\desktop.inip
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SystemRestore-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_for_KB976933~31bf3856ad364e35~x86~ja-JP~6.1.7601.17514.caty
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Telnet-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnky009.catp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnky008.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-MiscRedirection-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\wmp.dll
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prngt004.catW
              Source: mssecsvc.exe.4.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\FXSSVC.exe
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-OpticalMediaDisc-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cato
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\dxgkrnl.sys
              Source: mssecsvc.exe.4.drBinary string: y\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.002P
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Gadget-Platform-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TFTP-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-AddOn-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\1394ohci.sysp
              Source: mssecsvc.exe.4.drBinary string: z\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\SystemIndex.236.Crwl_^]
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\megasas.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SimpleTCP-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\ULIAGPKX.SYS
              Source: mssecsvc.exe.4.drBinary string: ^\Device\HarddiskVolume2\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Wired-Network-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SUA-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catin
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep004.cat\
              Source: mssecsvc.exe.4.drBinary string: V\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\tmp.edb175p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Editions-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catrs\p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IE-Troubleshooters-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\msshooks.dllp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\intelide.sys
              Source: mssecsvc.exe.4.drBinary string: 4\Device\HarddiskVolume2\Windows\SoftwareDistribution
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Xps-Foundation-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\TsUsbGD.sys
              Source: mssecsvc.exe.4.drBinary string: A\Device\HarddiskVolume2\Windows\System32\appidpolicyconverter.exe
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-InternetExplorer-Optional-Package-wrapper~31bf3856ad364e35~x86~en-US~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr006.catH
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\SISAGP.SYS8
              Source: mssecsvc.exe.4.drBinary string: }\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\INDEX.001T
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Branding-Ultimate-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-InternetExplorer-Optional-Package-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: p\Device\HarddiskVolume2\Windows\System32\winevt\Logs\Microsoft-Windows-NetworkAccessProtection%4Operational.evtxxpp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\flpydisk.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Indexing-Service-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat\$p
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\BrSerId.sysC
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\NlsLexicons0019.dll
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\wmpps.dll
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\Tasks\WPDGtn
              Source: mssecsvc.exe.4.drBinary string: U\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-InternetExplorer-Optional-Package~31bf3856ad364e35~x86~~8.0.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-DesktopWindowManager-uDWM-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\elxstor.sysV
              Source: mssecsvc.exe.4.drBinary string: ,\Device\HarddiskVolume2\Windows\System32\ras$X
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientExtensions-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SampleContent-Ringtones-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Killbits-Package~31bf3856ad364e35~x86~~8.0.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: I\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\rspndr.inf_loc
              Source: mssecsvc.exe.4.drBinary string: F\Device\HarddiskVolume2\Windows\Prefetch\SEARCHINDEXER.EXE-4A6353B9.pfH
              Source: mssecsvc.exe.4.drBinary string: a\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem12.CAT
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\vhdmp.sys
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\ipnat.sys4
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-SideShow-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: #\Device\HarddiskVolume3\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_for_KB2534111_SP1~31bf3856ad364e35~x86~~6.1.1.0.cat
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\errdev.sysu
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010012.ci
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\errdev.sys
              Source: mssecsvc.exe.4.drBinary string: h\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\fixcfg.log.lock
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\drmkaud.sys
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\umpass.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Drivers-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnin002.catCp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\lsi_scsi.sys
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\evbdx.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Media-Format-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00h.catSp
              Source: mssecsvc.exe.4.drBinary string: `\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem4.CATWp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnhp004.catWp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep00d.catCp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\hidbth.sys0C
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00e.catS
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\rasacd.sys6
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-MiscRedirection-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-UsbRedirector-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat:
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\modem.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ParentalControls-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sisraid2.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SNMP-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\viac7.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IE-Troubleshooters-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: I\Device\HarddiskVolume2\System Volume Information\SystemRestore\FRStagingp
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\Logs\SystemRestoreG
              Source: mssecsvc.exe.4.drBinary string: P\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\battery.inf_loc
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep005.cat\p
              Source: mssecsvc.exe.4.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\catroot@Sp
              Source: mssecsvc.exe.4.drBinary string: c\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: w\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files-1\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PeerToPeer-Full-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catt
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\hcw85cir.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Media-Foundation-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catore.p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Sensors-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00d.catGQp
              Source: mssecsvc.exe.4.drBinary string: ^\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\WindowsF
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaPlayback-OC-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: H\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\input.inf_locH
              Source: mssecsvc.exe.4.drBinary string: O\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\CompositeBus.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ICM-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat:
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-WindowsMediaPlayer-Troubleshooters-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: Q\Device\HarddiskVolume2\ProgramData\AVG Web TuneUp\ChromeExt\4.3.7.452\install.js
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IE-Troubleshooters-Package-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PhotoPremiumPackage~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\hidbatt.sys
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\iirsp.sys
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\display.inf_locM
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BLB-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnhp005.catC
              Source: mssecsvc.exe.4.drBinary string: @\Device\HarddiskVolume2\Program Files\Windows Media Player\ru-RU'p
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\viac7.sysD34
              Source: mssecsvc.exe.4.drBinary string: 8\Device\HarddiskVolume2\Program Files\AVG\Av\avgamps.exeW
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep00l.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-WMPNetworkSharingService-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\circlass.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RecDisc-SDP-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Hyper-V-Guest-Integration-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\lsi_sas2.sys
              Source: mssecsvc.exe.4.drBinary string: Y\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16\temp
              Source: mssecsvc.exe.4.drBinary string: \Device\CdRom0r
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-OpticalMediaDisc-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: v\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\FXSRESM.dll
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-LocalPrinting-Home-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\tdpipe.sys
              Source: mssecsvc.exe.4.drBinary string: ?\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: G\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\acpi.inf_loc
              Source: mssecsvc.exe.4.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\ega.cpi
              Source: mssecsvc.exe.4.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\wuaueng.dll
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientExtensions-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\msiscsi.sys
              Source: mssecsvc.exe.4.drBinary string: G\Device\HarddiskVolume2\Windows\System32\drivers\ru-RU\mountmgr.sys.mui
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\lsi_sas.sys
              Source: mssecsvc.exe.4.drBinary string: a\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem11.CAT
              Source: mssecsvc.exe.4.drBinary string: H\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\mshdc.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrUsbSer.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cath
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Backup-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-CodecPack-Basic-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: `\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem2.CAT
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\Tasks\WPD
              Source: mssecsvc.exe.4.drBinary string: S\Device\HarddiskVolume2\Windows\System32\config\systemprofile\Favorites\desktop.ini
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\ipnat.sys95E
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\irenum.sys
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\msmouse.inf_loc
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr009.cat1p
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\ipfltdrv.sys
              Source: mssecsvc.exe.4.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\drivers\smb.sysH
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\dxgkrnl.sysC
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\adpahci.sysp
              Source: mssecsvc.exe.4.drBinary string: G\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\disk.inf_loc
              Source: mssecsvc.exe.4.drBinary string: I\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\volume.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SNMP-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ClipsInTheLibrary-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: m\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: O\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe\W
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\msdtc.exe2F
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\ndisuio.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\0001000F.ci\Sp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\b57nd60x.sysp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00a.catGQ
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-InternetExplorer-Package~31bf3856ad364e35~x86~ru-RU~8.0.7601.17514.catf
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-WinOcr-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\nfrd960.sys
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\mshidkmdf.sys
              Source: mssecsvc.exe.4.drBinary string: S\Device\HarddiskVolume2\Windows\System32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}8p
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\bthmodem.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Backup-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: z\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\SystemIndex.236.gthr
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-AddOn-2-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat)
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-StickyNotes-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat385
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnky005.cat\p
              Source: mssecsvc.exe.4.drBinary string: T\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PeerDist-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: f\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: Z\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe4FC
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-CoreClientUAUE-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-InboxGames-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: @\Device\HarddiskVolume2\Windows\System32\appidcertstorecheck.exezI
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00i.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-RemoteApplications-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netrasa.inf_loc
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\blbdrive.inf_locH
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\stexstor.sys
              Source: mssecsvc.exe.4.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\drivers\udfs.sys
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prngt002.catW
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SnippingTool-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sermouse.sys
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sffp_sd.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NFS-ClientSKU-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SUA-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catleP
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\hidir.sys$(
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\mrxdav.sys
              Source: mssecsvc.exe.4.drBinary string: a\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\ntexe.catp
              Source: mssecsvc.exe.4.drBinary string: I\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\nettun.inf_loc
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\dmvsc.sysot\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010001.ciT
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RasCMAK-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RecDisc-SDP-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-CodecPack-Basic-Package-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: Z\Device\HarddiskVolume2\System Volume Information\SystemRestore\FRStaging\Windows\System32
              Source: mssecsvc.exe.4.drBinary string: _\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\nt5.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep00b.cat\p
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\tssecsrv.sys
              Source: mssecsvc.exe.4.drBinary string: [\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\wacompen.sysp
              Source: mssecsvc.exe.4.drBinary string: X\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-InboxGames-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat Ip
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Media-Foundation-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: a\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem10.CAT
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sbp2port.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TabletPC-OC-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat@.rel
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-CommandLineTools-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: `\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\ntph.catH
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_for_KB976902_RTM~31bf3856ad364e35~x86~~6.1.1.17514.catp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\nvraid.sys
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnle003.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TFTP-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: z\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: w\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Telnet-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-WMIProvider-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catC\Pr
              Source: mssecsvc.exe.4.drBinary string: g\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\AVG\AV\cfgall\fixcfg.lockH8H
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnin003.cat
              Source: mssecsvc.exe.4.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\NlsData0019.dllp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: s\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows Media Player NSS\3.0
              Source: mssecsvc.exe.4.drBinary string: p\Device\HarddiskVolume2\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SystemRestore-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\bxvbdx.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ProfessionalEdition-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-PremiumInboxGames-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\HdAudio.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-WinOcr-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MSMQ-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: W\Device\HarddiskVolume2\Windows\System32\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}
              Source: mssecsvc.exe.4.drBinary string: $\Device\HarddiskVolume2\Windows\Logs9
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\wacompen.sys
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr008.cat1
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Common-Modem-Drivers-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: 7\Device\HarddiskVolume2\Windows\System32\drivers\wd.sys
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\SISAGP.SYS
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ParentalControls-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\mscoree.dll
              Source: mssecsvc.exe.4.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\blackbox.dll
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-OfflineFiles-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: i\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Gadget-Platform-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat Fp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Sensors-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Basic-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Disk-Diagnosis-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printer-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\msdsm.sysh
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\iirsp.sysrdd
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-HomeBasicEdition-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: 1\Device\HarddiskVolume2\Windows\ehome\ehsched.exe
              Source: mssecsvc.exe.4.drBinary string: x\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\CiPT0000.002
              Source: mssecsvc.exe.4.drBinary string: `\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows~p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-PremiumInboxGames-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catI
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Telnet-Server-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-AddOn-2-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netsstpt.inf_loc
              Source: mssecsvc.exe.4.drBinary string: X\Device\HarddiskVolume2\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}t$p
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\hidserv.inf_loc
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\fsdepends.sys
              Source: mssecsvc.exe.4.drBinary string: E\Device\HarddiskVolume2\Windows\System32\drivers\rdpvideominiport.sys
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\VMBusHID.sys
              Source: mssecsvc.exe.4.drBinary string: Y\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RasCMAK-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00c.catGQ
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\usbuhci.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-PremiumTools-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\evbdx.sysskV
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BusinessScanning-Feature-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catK
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\iaStorV.sysr*
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\wmiacpi.sys
              Source: mssecsvc.exe.4.drBinary string: E\Device\HarddiskVolume2\ProgramData\Microsoft\Network\Connections\Pbk
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010012.dir%&p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Hyper-V-Common-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-CodecPack-Basic-Encoder-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netsstpt.inf_locp
              Source: mssecsvc.exe.4.drBinary string: F\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\hal.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GPUPipeline-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: !\Device\HarddiskVolume3\
              Source: mssecsvc.exe.4.drBinary string: q\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\fveui.dll0
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrSerWdm.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-UltimateEdition~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\HdAudio.sysd
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RasRip-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: z\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
              Source: mssecsvc.exe.4.drBinary string: g\Device\HarddiskVolume2\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host
              Source: mssecsvc.exe.4.drBinary string: k\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1_for_KB976902~31bf3856ad364e35~x86~~6.1.1.17514.catCp
              Source: mssecsvc.exe.4.drBinary string: F\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\cpu.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Media-Format-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Indexing-Service-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\0001000F.wsbbT
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-WMIProvider-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat$0p
              Source: mssecsvc.exe.4.drBinary string: J\Device\HarddiskVolume2\ProgramData\AVG Web TuneUp\CrashReport\crash.avgdx@"
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Links-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: V\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\tmp.edbp
              Source: mssecsvc.exe.4.drBinary string: h\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\CookiesC"
              Source: mssecsvc.exe.4.drBinary string: M\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\b57nd60x.sys
              Source: mssecsvc.exe.4.drBinary string: F\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\usb.inf_loc
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SnippingTool-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat0H
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr005.catHp
              Source: mssecsvc.exe.4.drBinary string: G\Device\HarddiskVolume2\Windows\System32\config\systemprofile\Favorites3
              Source: mssecsvc.exe.4.drBinary string: S\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Anytime-Upgrade-Results-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat:
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_for_KB976932~31bf3856ad364e35~x86~~6.1.0.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr00a.cat1
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnky007.catp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\scfilter.sys
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\filetrace.sys
              Source: mssecsvc.exe.4.drBinary string: M\Device\HarddiskVolume2\Program Files\AVG Web TuneUp\remote_configuration.xmlp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00y.catp
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\rdpdr.sys
              Source: mssecsvc.exe.4.drBinary string: `\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\ntpe.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00g.catS
              Source: mssecsvc.exe.4.drBinary string: A\Device\HarddiskVolume2\Windows\Prefetch\WMPNETWK.EXE-D9F2A96F.pfp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\terminpt.sys
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnkm004.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5um
              Source: mssecsvc.exe.4.drBinary string: H\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc
              Source: mssecsvc.exe.4.drBinary string: j\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exeF75
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\hidbatt.sysL$
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\NaturalLanguage6.dllp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-OfflineFiles-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-MultiplayerInboxGames-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-AddOn-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\wbem\WmiApSrv.exeL
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\irenum.systr
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\vmbus.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BLB-Client-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TerminalServices-Publishing-WMIProvider-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: l\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-CodecPack-Basic-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RDC-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cath
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnhp002.catWp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\isapnp.sysvip
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr004.catH
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Anytime-Upgrade-Results-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat8
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BusinessScanning-Feature-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\vms3cap.sys
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnge001.catp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\viaide.sys
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\HpSAMD.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Tuner-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: c\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\ntprint.catHi
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep00e.catC
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ICM-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\isapnp.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-Foundation-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrUsbMdm.sys
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\IPMIDrv.sys
              Source: mssecsvc.exe.4.drBinary string: ,\Device\HarddiskVolume2\Windows\Temp\_avast_
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnky003.cat\p
              Source: mssecsvc.exe.4.drBinary string: ^\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sffp_sd.sysH
              Source: mssecsvc.exe.4.drBinary string: `\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem3.CATo
              Source: mssecsvc.exe.4.drBinary string: }\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PeerDist-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: F\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Temp
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netsstpa.inf_loc
              Source: mssecsvc.exe.4.drBinary string: 1\Device\HarddiskVolume2\Windows\System32\upnp.dll
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MSMQ-Client-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat4
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\wimmount.sys
              Source: mssecsvc.exe.4.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\catroot2\edb.chk
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\vsmraid.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Links-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: r\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-VirtualXP-Licensing-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat~
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-XPSServices-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\alg.exe-
              Source: mssecsvc.exe.4.drBinary string: A\Device\HarddiskVolume2\Windows\Prefetch\WMPNSCFG.EXE-FC0D39BF.pfp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-SideShow-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NFS-ClientSKU-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: j\Device\HarddiskVolume2\Users\
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\UAGP35.SYSt
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\serenum.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TabletPC-OC-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat<-p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GPUPipeline-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catPROTp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnkm003.catp
              Source: mssecsvc.exe.4.drBinary string: r\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE500Cp
              Source: mssecsvc.exe.4.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\drivers\cdfs.sys
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep002.cat
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\USBSTOR.SYS
              Source: mssecsvc.exe.4.drBinary string: V\Device\HarddiskVolume2\ProgramData\Microsoft\Search\Data\Applications\Windows\tmp.edb
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume3\$
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NetFx3-OC-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cath
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Premium-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catdp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-HomePremiumEdition-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep003.catpp
              Source: mssecsvc.exe.4.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\tdtcp.sys+
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\winusb.sysc
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\usbvideo.inf_loc@"
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\SearchFilterHost.exe
              Source: mssecsvc.exe.4.drBinary string: E\Device\HarddiskVolume2\Windows\System32\drivers\ru-RU\AGP440.sys.muip
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NetFx3-OC-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PhotoPremiumPackage~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\filetrace.syst
              Source: mssecsvc.exe.4.drBinary string: C\Device\HarddiskVolume2\Program Files\Internet Explorer\ieproxy.dll
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Networking-MPSSVC-Rules-UltimateEdition-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-InternetExplorer-Optional-Package~31bf3856ad364e35~x86~en-US~8.0.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca003.cat1p
              Source: mssecsvc.exe.4.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\VSSVC.exe
              Source: mssecsvc.exe.4.drBinary string: T\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnky006.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Disk-Diagnosis-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-UltimateEdition-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat8
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_for_KB976902~31bf3856ad364e35~x86~~6.1.1.17514.cat32\p
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\iaStorV.sys+
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnin004.catCp
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\ProgramData\AVG Web TuneUp\CrashReport
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-Foundation-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat_
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnep00f.catCp
              Source: mssecsvc.exe.4.drBinary string: 6\Device\HarddiskVolume2\Windows\System32\p2pcollab.dll
              Source: mssecsvc.exe.4.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\drivers\fdc.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RemoteAssistance-Package-Client~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catdp
              Source: mssecsvc.exe.4.drBinary string: K\Device\HarddiskVolume2\Windows\Prefetch\SEARCHPROTOCOLHOST.EXE-0CB8CADE.pfL
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnbr007.catHp
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-Customization-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catp
              Source: mssecsvc.exe.4.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\fsdepends.sysatr
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SimpleTCP-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume3\
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-XPSServices-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-VirtualPC-Licensing-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catH
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrFiltUp.sys
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\elxstor.sys
              Source: mssecsvc.exe.4.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sffdisk.sysA
              Source: mssecsvc.exe.4.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\processr.sys
              Source: mssecsvc.exe.4.drBinary string: 1\Device\HarddiskVolume2\Windows\System32\catroot2p
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Personalization-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe.4.drBinary string: d\Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\prnca00x.catSp
              Source: mssecsvc.exe.4.drBinary string: o\Device\HarddiskVolume2\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows Media Player NSSE
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-WMPNetworkSharingService-Package~31bf3856ad364e35~x86~ru-RU~6.1.7601.17514.catH@
              Source: mssecsvc.exe.4.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\alg.exe
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\pciide.sys
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1_for_KB2534111~31bf3856ad364e35~x86~~6.1.1.0.catp
              Source: mssecsvc.exe.4.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\nvstor.sys~
              Source: mssecsvc.exe.4.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\sppsvc.exe
              Source: mssecsvc.exe.4.drBinary string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-StarterEdition-wrapper~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe, 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000000.1363779219.000000000040E000.00000008.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000000.1384126735.000000000040E000.00000008.00000001.01000000.00000007.sdmp, xjljKPlxqO.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
              Source: xjljKPlxqO.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\xjljKPlxqO.dll,PlayGame
              Source: xjljKPlxqO.dllVirustotal: Detection: 92%
              Source: xjljKPlxqO.dllReversingLabs: Detection: 94%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\xjljKPlxqO.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\xjljKPlxqO.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: xjljKPlxqO.dllStatic file information: File size 5267459 > 1048576
              Source: xjljKPlxqO.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7948Thread sleep count: 93 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7948Thread sleep time: -186000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7952Thread sleep count: 129 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7952Thread sleep count: 41 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7948Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000000.1363819497.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1384752464.0000000000410000.00000002.00000001.01000000.00000007.sdmp, xjljKPlxqO.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Hyper-V-Common-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.catp
              Source: mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWN
              Source: mssecsvc.exe, 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000009.00000000.1363819497.0000000000410000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000C.00000002.1384752464.0000000000410000.00000002.00000001.01000000.00000007.sdmp, xjljKPlxqO.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: \Device\HarddiskVolume2\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Hyper-V-Guest-Integration-Drivers-Package~31bf3856ad364e35~x86~~6.1.7601.17514.cat
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004790424.0000000000CD0000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004790424.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2004790424.0000000000C68000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1363324729.0000000000CD0000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000006.00000002.1366023805.0000000000CC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`2
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591534 Sample: xjljKPlxqO.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 63 Tries to download HTTP data from a sinkholed server 2->63 65 Suricata IDS alerts for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 6 other signatures 2->69 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        49 192.168.2.100 unknown unknown 12->49 51 192.168.2.102 unknown unknown 12->51 53 98 other IPs or domains 12->53 79 Connects to many different private IPs via SMB (likely to spread or exploit) 12->79 81 Connects to many different private IPs (likely to spread or exploit) 12->81 signatures6 process7 file8 26 rundll32.exe 16->26         started        61 Drops executables to the windows directory (C:\Windows) and starts them 18->61 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 83 Drops executables to the windows directory (C:\Windows) and starts them 28->83 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 55 Antivirus detection for dropped file 32->55 57 Multi AV Scanner detection for dropped file 32->57 59 Machine Learning detection for dropped file 32->59 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 71 Detected Wannacry Ransomware 38->71 73 Antivirus detection for dropped file 38->73 75 Multi AV Scanner detection for dropped file 38->75 77 Machine Learning detection for dropped file 38->77

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              xjljKPlxqO.dll93%VirustotalBrowse
              xjljKPlxqO.dll95%ReversingLabsWin32.Ransomware.WannaCry
              xjljKPlxqO.dll100%AviraTR/Ransom.Gen
              xjljKPlxqO.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\Windows\mssecsvc.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)95%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\mssecsvc.exe93%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe95%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com80%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.4.drfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/smssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.kryptoslogic.commssecsvc.exe, 00000006.00000002.1366023805.0000000000CED000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/-mssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 0000000B.00000002.1385818377.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hmssecsvc.exe, 00000006.00000002.1366023805.0000000000CD4000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com8mssecsvc.exe, 0000000B.00000002.1385818377.0000000000D27000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2003978964.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  135.236.167.1
                                  unknownUnited States
                                  10455LUCENT-CIOUSfalse
                                  113.123.253.2
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  113.123.253.1
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  37.113.179.1
                                  unknownRussian Federation
                                  41661ERTH-CHEL-ASRUfalse
                                  74.144.36.1
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  123.191.147.102
                                  unknownChina
                                  4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                  206.238.32.1
                                  unknownUnited States
                                  174COGENT-174USfalse
                                  119.140.230.2
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  119.140.230.1
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  113.123.253.149
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  80.10.120.84
                                  unknownFrance
                                  8376JordanDataCommunicationsJOfalse
                                  74.144.36.140
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  135.236.167.35
                                  unknownUnited States
                                  10455LUCENT-CIOUSfalse
                                  164.216.112.1
                                  unknownUnited States
                                  5180DNIC-ASBLK-05120-05376USfalse
                                  117.57.238.1
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  212.96.223.1
                                  unknownRussian Federation
                                  12389ROSTELECOM-ASRUfalse
                                  119.140.230.219
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  14.12.50.252
                                  unknownJapan2516KDDIKDDICORPORATIONJPfalse
                                  IP
                                  192.168.2.148
                                  192.168.2.149
                                  192.168.2.146
                                  192.168.2.147
                                  192.168.2.140
                                  192.168.2.141
                                  192.168.2.144
                                  192.168.2.145
                                  192.168.2.142
                                  192.168.2.143
                                  192.168.2.159
                                  192.168.2.157
                                  192.168.2.158
                                  192.168.2.151
                                  192.168.2.152
                                  192.168.2.150
                                  192.168.2.155
                                  192.168.2.156
                                  192.168.2.153
                                  192.168.2.154
                                  192.168.2.126
                                  192.168.2.247
                                  192.168.2.127
                                  192.168.2.248
                                  192.168.2.124
                                  192.168.2.245
                                  192.168.2.125
                                  192.168.2.246
                                  192.168.2.128
                                  192.168.2.249
                                  192.168.2.129
                                  192.168.2.240
                                  192.168.2.122
                                  192.168.2.243
                                  192.168.2.123
                                  192.168.2.244
                                  192.168.2.120
                                  192.168.2.241
                                  192.168.2.121
                                  192.168.2.242
                                  192.168.2.97
                                  192.168.2.137
                                  192.168.2.96
                                  192.168.2.138
                                  192.168.2.99
                                  192.168.2.135
                                  192.168.2.98
                                  192.168.2.136
                                  192.168.2.139
                                  192.168.2.250
                                  192.168.2.130
                                  192.168.2.251
                                  192.168.2.91
                                  192.168.2.90
                                  192.168.2.93
                                  192.168.2.133
                                  192.168.2.254
                                  192.168.2.92
                                  192.168.2.134
                                  192.168.2.95
                                  192.168.2.131
                                  192.168.2.252
                                  192.168.2.94
                                  192.168.2.132
                                  192.168.2.253
                                  192.168.2.104
                                  192.168.2.225
                                  192.168.2.105
                                  192.168.2.226
                                  192.168.2.102
                                  192.168.2.223
                                  192.168.2.103
                                  192.168.2.224
                                  192.168.2.108
                                  192.168.2.229
                                  192.168.2.109
                                  192.168.2.106
                                  192.168.2.227
                                  192.168.2.107
                                  192.168.2.228
                                  192.168.2.100
                                  192.168.2.221
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1591534
                                  Start date and time:2025-01-15 02:59:10 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 3s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:16
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:xjljKPlxqO.dll
                                  renamed because original name is a hash value
                                  Original Sample Name:3860bdea429da898e48421ae950340ee.dll
                                  Detection:MAL
                                  Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .dll
                                  • Stop behavior analysis, all processes terminated
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212, 4.175.87.197
                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target tasksche.exe, PID 7964 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  21:00:06API Interceptor1x Sleep call for process: loaddll32.exe modified
                                  21:00:39API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  s-part-0017.t-0009.t-msedge.netGUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                  • 13.107.246.45
                                  9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                  • 13.107.246.45
                                  https://telegrams-tw.org/Get hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  https://6y.tickarmoz.ru/aY57/Get hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  Eastern Contractors Corporation Contract and submittal document.emlGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  download.exeGet hashmaliciousBabuk, MimikatzBrowse
                                  • 13.107.246.45
                                  https://emp.eduyield.com/el?aid=962445be-3c17-11ec-9620-0e45aa61dde5&cid=497&dest=https://google.com/amp/avrancecorp.com/wp-web/Griffinwink/64616b6f74616c796e6e406772696666696e77696e6b2e636f6d/$ZGFrb3&pid=564628&rid=68730789Get hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                  • 13.107.246.45
                                  19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                  • 13.107.246.45
                                  https://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.166.228
                                  9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.166.228
                                  v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.166.228
                                  hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.167.228
                                  87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                  • 104.16.166.228
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CHINANET-BACKBONENo31Jin-rongStreetCNGUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                  • 119.135.172.1
                                  tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                  • 219.130.9.1
                                  330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                  • 113.88.91.1
                                  9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                  • 60.165.77.15
                                  D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                  • 123.102.22.1
                                  YZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                                  • 116.248.34.1
                                  hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                  • 115.209.51.51
                                  eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                  • 58.51.75.1
                                  m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                  • 112.117.58.143
                                  5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                  • 49.87.106.1
                                  CHINANET-BACKBONENo31Jin-rongStreetCNGUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                  • 119.135.172.1
                                  tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                  • 219.130.9.1
                                  330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                  • 113.88.91.1
                                  9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                  • 60.165.77.15
                                  D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                  • 123.102.22.1
                                  YZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                                  • 116.248.34.1
                                  hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                  • 115.209.51.51
                                  eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                  • 58.51.75.1
                                  m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                  • 112.117.58.143
                                  5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                  • 49.87.106.1
                                  LUCENT-CIOUSmeth10.elfGet hashmaliciousMiraiBrowse
                                  • 135.237.84.122
                                  meth3.elfGet hashmaliciousMiraiBrowse
                                  • 135.87.254.179
                                  ppc.elfGet hashmaliciousUnknownBrowse
                                  • 135.140.7.164
                                  meth4.elfGet hashmaliciousMiraiBrowse
                                  • 135.237.36.213
                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 135.1.165.50
                                  meth15.elfGet hashmaliciousMiraiBrowse
                                  • 135.230.180.163
                                  sh4.elfGet hashmaliciousUnknownBrowse
                                  • 152.151.95.18
                                  elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 135.223.213.150
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 135.85.115.131
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 135.7.203.70
                                  No context
                                  No context
                                  Process:C:\Windows\mssecsvc.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3514368
                                  Entropy (8bit):7.748514844464512
                                  Encrypted:false
                                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P5OAVp2Hj:QqPe1Cxcxk3ZAEUadMc4Hj
                                  MD5:938C8405B0CCF0BA9635BB444CEC105D
                                  SHA1:C94A31C823BEC3B35448185601DAED18678DC38E
                                  SHA-256:9E9C78583F5BE4A758525BD28F7F579597F07A567C5474E4AE08785813F27420
                                  SHA-512:26E8332F165194772AA6EEA71F95E241F357C090EF1AE0F2DEC8BF175A69EDF27AA2A716D611484DB3688E06FD37B3B37F8EA70781F17DC894F9C9F3EC031DEE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\rundll32.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3723264
                                  Entropy (8bit):7.699619492917274
                                  Encrypted:false
                                  SSDEEP:98304:XDqPoBhz1aRxcSUDk36SAEdhvxWa9P5OAVp2HI:XDqPe1Cxcxk3ZAEUadMc4HI
                                  MD5:96236BE68E3F6B6711717EE2516BC8EF
                                  SHA1:D2A6327BB7D56A12885FFF4A256B56C229066D40
                                  SHA-256:62B9EE1FDB5D807616F299C5102D9EFA2D95611F3FC08A784C77005601BC14F2
                                  SHA-512:4E6E55B6B89DA7A09F36F334312523740EF7132A8504B3B54777597FCD58957B89017341F40FA944AF5640F1346D1E8E9B45AFA510EC33E236314F495090A865
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 93%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\mssecsvc.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3514368
                                  Entropy (8bit):7.748514844464512
                                  Encrypted:false
                                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P5OAVp2Hj:QqPe1Cxcxk3ZAEUadMc4Hj
                                  MD5:938C8405B0CCF0BA9635BB444CEC105D
                                  SHA1:C94A31C823BEC3B35448185601DAED18678DC38E
                                  SHA-256:9E9C78583F5BE4A758525BD28F7F579597F07A567C5474E4AE08785813F27420
                                  SHA-512:26E8332F165194772AA6EEA71F95E241F357C090EF1AE0F2DEC8BF175A69EDF27AA2A716D611484DB3688E06FD37B3B37F8EA70781F17DC894F9C9F3EC031DEE
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.074735415031977
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                  • DOS Executable Generic (2002/1) 0.20%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:xjljKPlxqO.dll
                                  File size:5'267'459 bytes
                                  MD5:3860bdea429da898e48421ae950340ee
                                  SHA1:26e695bc874cb9b608099e1bf4d6b17e915a281c
                                  SHA256:0590144053b6c24937a6ad1a34186edcddb16442b941eac553081d583a51e754
                                  SHA512:dd091174bdf75eeb8836f0f840f064cbc2abd059e5fd36bf46e088f35f4f90ac19065228fd59804cfbd375215d7ecb53121df2cf57287969dd29813e4d2ff49d
                                  SSDEEP:98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5OAVp2H:TDqPe1Cxcxk3ZAEUadMc4H
                                  TLSH:DD36E001D1E41A64E6F24AF626BADB10977ABE46D95BDA5E1221010F0C73F1CCDE2F2D
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                  Icon Hash:7ae282899bbab082
                                  Entrypoint:0x100011e9
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x10000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                  DLL Characteristics:
                                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push ebx
                                  mov ebx, dword ptr [ebp+08h]
                                  push esi
                                  mov esi, dword ptr [ebp+0Ch]
                                  push edi
                                  mov edi, dword ptr [ebp+10h]
                                  test esi, esi
                                  jne 00007F5C48CA796Bh
                                  cmp dword ptr [10003140h], 00000000h
                                  jmp 00007F5C48CA7988h
                                  cmp esi, 01h
                                  je 00007F5C48CA7967h
                                  cmp esi, 02h
                                  jne 00007F5C48CA7984h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007F5C48CA796Bh
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  test eax, eax
                                  je 00007F5C48CA796Eh
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F5C48CA787Ah
                                  test eax, eax
                                  jne 00007F5C48CA7966h
                                  xor eax, eax
                                  jmp 00007F5C48CA79B0h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F5C48CA772Ch
                                  cmp esi, 01h
                                  mov dword ptr [ebp+0Ch], eax
                                  jne 00007F5C48CA796Eh
                                  test eax, eax
                                  jne 00007F5C48CA7999h
                                  push edi
                                  push eax
                                  push ebx
                                  call 00007F5C48CA7856h
                                  test esi, esi
                                  je 00007F5C48CA7967h
                                  cmp esi, 03h
                                  jne 00007F5C48CA7988h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F5C48CA7845h
                                  test eax, eax
                                  jne 00007F5C48CA7965h
                                  and dword ptr [ebp+0Ch], eax
                                  cmp dword ptr [ebp+0Ch], 00000000h
                                  je 00007F5C48CA7973h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007F5C48CA796Ah
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  mov dword ptr [ebp+0Ch], eax
                                  mov eax, dword ptr [ebp+0Ch]
                                  pop edi
                                  pop esi
                                  pop ebx
                                  pop ebp
                                  retn 000Ch
                                  jmp dword ptr [10002028h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  Programming Language:
                                  • [ C ] VS98 (6.0) build 8168
                                  • [C++] VS98 (6.0) build 8168
                                  • [RES] VS98 (6.0) cvtres build 1720
                                  • [LNK] VS98 (6.0) imp/exp build 8168
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x40000x5000600x50100068b36fced77e55ef5c03a7afeb828691unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  W0x40600x500000dataEnglishUnited States0.8770942687988281
                                  DLLImport
                                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                  NameOrdinalAddress
                                  PlayGame10x10001114
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-15T03:00:05.155147+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.9563541.1.1.153UDP
                                  2025-01-15T03:00:05.637070+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949728104.16.167.22880TCP
                                  2025-01-15T03:00:05.637070+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.949728104.16.167.22880TCP
                                  2025-01-15T03:00:05.637070+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.949728104.16.167.22880TCP
                                  2025-01-15T03:00:05.637070+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.949728104.16.167.22880TCP
                                  2025-01-15T03:00:05.637070+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.949728104.16.167.22880TCP
                                  2025-01-15T03:00:05.637268+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.949728TCP
                                  2025-01-15T03:00:06.281431+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949733104.16.167.22880TCP
                                  2025-01-15T03:00:06.281431+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.949733104.16.167.22880TCP
                                  2025-01-15T03:00:06.281431+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.949733104.16.167.22880TCP
                                  2025-01-15T03:00:06.281431+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.949733104.16.167.22880TCP
                                  2025-01-15T03:00:06.281431+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.949733104.16.167.22880TCP
                                  2025-01-15T03:00:06.281879+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.949733TCP
                                  2025-01-15T03:00:08.286484+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949760104.16.167.22880TCP
                                  2025-01-15T03:00:08.286484+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.949760104.16.167.22880TCP
                                  2025-01-15T03:00:08.286484+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.949760104.16.167.22880TCP
                                  2025-01-15T03:00:08.286484+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.949760104.16.167.22880TCP
                                  2025-01-15T03:00:08.286484+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.949760104.16.167.22880TCP
                                  2025-01-15T03:00:08.286938+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.949760TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 15, 2025 02:59:57.282262087 CET49677443192.168.2.920.189.173.11
                                  Jan 15, 2025 02:59:57.891694069 CET49677443192.168.2.920.189.173.11
                                  Jan 15, 2025 02:59:57.907284975 CET49673443192.168.2.9204.79.197.203
                                  Jan 15, 2025 02:59:59.094805956 CET49677443192.168.2.920.189.173.11
                                  Jan 15, 2025 03:00:01.187005043 CET49676443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:01.204111099 CET49675443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:01.376117945 CET49674443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:01.500998020 CET49677443192.168.2.920.189.173.11
                                  Jan 15, 2025 03:00:05.170037031 CET4972880192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.176100969 CET8049728104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:05.176270962 CET4972880192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.176311970 CET4972880192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.181180954 CET8049728104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:05.636996031 CET8049728104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:05.637069941 CET4972880192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.637177944 CET4972880192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.637268066 CET8049728104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:05.637332916 CET4972880192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.641952991 CET8049728104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:05.805603027 CET4973380192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.811391115 CET8049733104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:05.811454058 CET4973380192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.811822891 CET4973380192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:05.817608118 CET8049733104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:06.281361103 CET8049733104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:06.281430960 CET4973380192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:06.281625986 CET4973380192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:06.281878948 CET8049733104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:06.281929970 CET4973380192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:06.286391973 CET8049733104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:06.313476086 CET49677443192.168.2.920.189.173.11
                                  Jan 15, 2025 03:00:06.373332024 CET49737445192.168.2.939.14.91.21
                                  Jan 15, 2025 03:00:06.378170013 CET4454973739.14.91.21192.168.2.9
                                  Jan 15, 2025 03:00:06.378247976 CET49737445192.168.2.939.14.91.21
                                  Jan 15, 2025 03:00:06.378323078 CET49737445192.168.2.939.14.91.21
                                  Jan 15, 2025 03:00:06.383301020 CET4454973739.14.91.21192.168.2.9
                                  Jan 15, 2025 03:00:06.383353949 CET49737445192.168.2.939.14.91.21
                                  Jan 15, 2025 03:00:06.399841070 CET49738445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.405975103 CET4454973839.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:06.406069994 CET49738445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.406848907 CET49738445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.412554026 CET4454973839.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:06.412612915 CET49738445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.412962914 CET49739445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.417788029 CET4454973939.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:06.417845011 CET49739445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.417922974 CET49739445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:06.422739029 CET4454973939.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:07.516618967 CET49673443192.168.2.9204.79.197.203
                                  Jan 15, 2025 03:00:07.785017014 CET4976080192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:07.789916039 CET8049760104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:07.790503979 CET4976080192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:07.792748928 CET4976080192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:07.797588110 CET8049760104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:08.286416054 CET8049760104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:08.286484003 CET4976080192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:08.286937952 CET8049760104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:08.286986113 CET4976080192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:08.289088964 CET4976080192.168.2.9104.16.167.228
                                  Jan 15, 2025 03:00:08.293951988 CET8049760104.16.167.228192.168.2.9
                                  Jan 15, 2025 03:00:08.410840034 CET49768445192.168.2.9186.236.250.99
                                  Jan 15, 2025 03:00:08.415783882 CET44549768186.236.250.99192.168.2.9
                                  Jan 15, 2025 03:00:08.415872097 CET49768445192.168.2.9186.236.250.99
                                  Jan 15, 2025 03:00:08.416104078 CET49770445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.416582108 CET49768445192.168.2.9186.236.250.99
                                  Jan 15, 2025 03:00:08.420960903 CET44549770186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:08.421021938 CET49770445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.421116114 CET49770445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.421472073 CET44549768186.236.250.99192.168.2.9
                                  Jan 15, 2025 03:00:08.422555923 CET49768445192.168.2.9186.236.250.99
                                  Jan 15, 2025 03:00:08.424495935 CET49771445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.426076889 CET44549770186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:08.426134109 CET49770445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.429316998 CET44549771186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:08.429371119 CET49771445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.429418087 CET49771445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:08.434222937 CET44549771186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:10.411535025 CET49807445192.168.2.9116.25.141.29
                                  Jan 15, 2025 03:00:10.418683052 CET44549807116.25.141.29192.168.2.9
                                  Jan 15, 2025 03:00:10.418752909 CET49807445192.168.2.9116.25.141.29
                                  Jan 15, 2025 03:00:10.418840885 CET49807445192.168.2.9116.25.141.29
                                  Jan 15, 2025 03:00:10.419070005 CET49808445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.425158024 CET44549808116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:10.425250053 CET49808445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.425266981 CET44549807116.25.141.29192.168.2.9
                                  Jan 15, 2025 03:00:10.425308943 CET49807445192.168.2.9116.25.141.29
                                  Jan 15, 2025 03:00:10.425384045 CET49808445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.427665949 CET49809445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.431550026 CET44549808116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:10.431593895 CET49808445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.433748960 CET44549809116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:10.434489965 CET49809445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.434566975 CET49809445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:10.441108942 CET44549809116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:10.797889948 CET49676443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:10.813512087 CET49675443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:10.985367060 CET49674443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:12.427300930 CET49843445192.168.2.9137.156.254.229
                                  Jan 15, 2025 03:00:12.434108019 CET44549843137.156.254.229192.168.2.9
                                  Jan 15, 2025 03:00:12.434171915 CET49843445192.168.2.9137.156.254.229
                                  Jan 15, 2025 03:00:12.434292078 CET49843445192.168.2.9137.156.254.229
                                  Jan 15, 2025 03:00:12.434489965 CET49844445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.440814972 CET44549844137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:12.440833092 CET44549843137.156.254.229192.168.2.9
                                  Jan 15, 2025 03:00:12.440875053 CET49844445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.440897942 CET49843445192.168.2.9137.156.254.229
                                  Jan 15, 2025 03:00:12.441004992 CET49844445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.442441940 CET49845445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.447479010 CET44549844137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:12.447526932 CET49844445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.448506117 CET44549845137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:12.448566914 CET49845445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.448638916 CET49845445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:12.454580069 CET44549845137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:12.742410898 CET4434970423.206.229.209192.168.2.9
                                  Jan 15, 2025 03:00:12.742803097 CET49704443192.168.2.923.206.229.209
                                  Jan 15, 2025 03:00:14.439933062 CET49878445192.168.2.938.185.104.173
                                  Jan 15, 2025 03:00:14.444766045 CET4454987838.185.104.173192.168.2.9
                                  Jan 15, 2025 03:00:14.444853067 CET49878445192.168.2.938.185.104.173
                                  Jan 15, 2025 03:00:14.444953918 CET49878445192.168.2.938.185.104.173
                                  Jan 15, 2025 03:00:14.445199013 CET49880445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.450862885 CET4454988038.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:14.450895071 CET4454987838.185.104.173192.168.2.9
                                  Jan 15, 2025 03:00:14.450934887 CET49880445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.450962067 CET49878445192.168.2.938.185.104.173
                                  Jan 15, 2025 03:00:14.451051950 CET49880445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.451967955 CET49881445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.456024885 CET4454988038.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:14.456091881 CET49880445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.457039118 CET4454988138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:14.457112074 CET49881445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.457170010 CET49881445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:14.463413000 CET4454988138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:15.922888041 CET49677443192.168.2.920.189.173.11
                                  Jan 15, 2025 03:00:16.457194090 CET49916445192.168.2.988.249.236.9
                                  Jan 15, 2025 03:00:16.462232113 CET4454991688.249.236.9192.168.2.9
                                  Jan 15, 2025 03:00:16.462316036 CET49916445192.168.2.988.249.236.9
                                  Jan 15, 2025 03:00:16.462399006 CET49916445192.168.2.988.249.236.9
                                  Jan 15, 2025 03:00:16.462640047 CET49917445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.467353106 CET4454991688.249.236.9192.168.2.9
                                  Jan 15, 2025 03:00:16.467411041 CET49916445192.168.2.988.249.236.9
                                  Jan 15, 2025 03:00:16.467468977 CET4454991788.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:16.467530966 CET49917445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.467629910 CET49917445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.468556881 CET49918445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.472489119 CET4454991788.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:16.472564936 CET49917445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.473448992 CET4454991888.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:16.473520994 CET49918445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.473576069 CET49918445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:16.478396893 CET4454991888.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:18.915256977 CET49951445192.168.2.9153.68.53.227
                                  Jan 15, 2025 03:00:18.920305967 CET44549951153.68.53.227192.168.2.9
                                  Jan 15, 2025 03:00:18.920396090 CET49951445192.168.2.9153.68.53.227
                                  Jan 15, 2025 03:00:18.923492908 CET49951445192.168.2.9153.68.53.227
                                  Jan 15, 2025 03:00:18.923652887 CET49952445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.928364038 CET44549951153.68.53.227192.168.2.9
                                  Jan 15, 2025 03:00:18.928404093 CET44549951153.68.53.227192.168.2.9
                                  Jan 15, 2025 03:00:18.928442955 CET44549952153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:18.928457022 CET49951445192.168.2.9153.68.53.227
                                  Jan 15, 2025 03:00:18.928523064 CET49952445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.931011915 CET49952445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.935842991 CET44549952153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:18.935915947 CET49952445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.943373919 CET49954445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.948347092 CET44549954153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:18.948410988 CET49954445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.948440075 CET49954445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:18.953303099 CET44549954153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:20.642260075 CET49992445192.168.2.9113.123.253.149
                                  Jan 15, 2025 03:00:20.647161007 CET44549992113.123.253.149192.168.2.9
                                  Jan 15, 2025 03:00:20.647319078 CET49992445192.168.2.9113.123.253.149
                                  Jan 15, 2025 03:00:20.647419930 CET49992445192.168.2.9113.123.253.149
                                  Jan 15, 2025 03:00:20.647569895 CET49993445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.652333975 CET44549992113.123.253.149192.168.2.9
                                  Jan 15, 2025 03:00:20.652352095 CET44549992113.123.253.149192.168.2.9
                                  Jan 15, 2025 03:00:20.652369022 CET44549993113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:20.652427912 CET49992445192.168.2.9113.123.253.149
                                  Jan 15, 2025 03:00:20.652468920 CET49993445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.652519941 CET49993445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.652801037 CET49994445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.657502890 CET44549993113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:20.657588005 CET44549994113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:20.657641888 CET49993445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.657645941 CET49994445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.657697916 CET49994445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:20.662451029 CET44549994113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:22.657769918 CET50025445192.168.2.9119.140.230.219
                                  Jan 15, 2025 03:00:22.662636995 CET44550025119.140.230.219192.168.2.9
                                  Jan 15, 2025 03:00:22.662743092 CET50025445192.168.2.9119.140.230.219
                                  Jan 15, 2025 03:00:22.662743092 CET50025445192.168.2.9119.140.230.219
                                  Jan 15, 2025 03:00:22.662945986 CET50026445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.667881012 CET44550026119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:22.667896032 CET44550025119.140.230.219192.168.2.9
                                  Jan 15, 2025 03:00:22.667973042 CET50026445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.668104887 CET50026445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.668279886 CET50025445192.168.2.9119.140.230.219
                                  Jan 15, 2025 03:00:22.668535948 CET50027445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.673558950 CET44550026119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:22.673619986 CET50026445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.673863888 CET44550027119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:22.673934937 CET50027445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.673970938 CET50027445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:22.679424047 CET44550027119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:24.673835039 CET50062445192.168.2.980.10.120.84
                                  Jan 15, 2025 03:00:24.678936005 CET4455006280.10.120.84192.168.2.9
                                  Jan 15, 2025 03:00:24.679003954 CET50062445192.168.2.980.10.120.84
                                  Jan 15, 2025 03:00:24.679101944 CET50062445192.168.2.980.10.120.84
                                  Jan 15, 2025 03:00:24.679279089 CET50063445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.683989048 CET4455006280.10.120.84192.168.2.9
                                  Jan 15, 2025 03:00:24.684042931 CET50062445192.168.2.980.10.120.84
                                  Jan 15, 2025 03:00:24.684154034 CET4455006380.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:24.684214115 CET50063445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.684314966 CET50063445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.684736967 CET50064445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.689106941 CET4455006380.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:24.689157009 CET50063445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.689572096 CET4455006480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:24.689625978 CET50064445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.689662933 CET50064445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:24.694423914 CET4455006480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:26.689292908 CET50095445192.168.2.9164.216.112.251
                                  Jan 15, 2025 03:00:26.694163084 CET44550095164.216.112.251192.168.2.9
                                  Jan 15, 2025 03:00:26.694248915 CET50095445192.168.2.9164.216.112.251
                                  Jan 15, 2025 03:00:26.694283962 CET50095445192.168.2.9164.216.112.251
                                  Jan 15, 2025 03:00:26.694525957 CET50096445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.699295998 CET44550096164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:26.699460983 CET44550095164.216.112.251192.168.2.9
                                  Jan 15, 2025 03:00:26.699531078 CET50095445192.168.2.9164.216.112.251
                                  Jan 15, 2025 03:00:26.699615955 CET50096445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.699615955 CET50096445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.699914932 CET50097445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.704612970 CET44550096164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:26.704683065 CET44550097164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:26.704751968 CET50096445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.704778910 CET50097445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.704826117 CET50097445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:26.709599018 CET44550097164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:27.788573980 CET4454973939.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:27.788633108 CET49739445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:27.788681984 CET49739445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:27.788753033 CET49739445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:27.793956995 CET4454973939.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:27.793972969 CET4454973939.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:28.704781055 CET50134445192.168.2.945.205.93.159
                                  Jan 15, 2025 03:00:28.710472107 CET4455013445.205.93.159192.168.2.9
                                  Jan 15, 2025 03:00:28.711780071 CET50134445192.168.2.945.205.93.159
                                  Jan 15, 2025 03:00:28.711965084 CET50135445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.712022066 CET50134445192.168.2.945.205.93.159
                                  Jan 15, 2025 03:00:28.717668056 CET4455013545.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:28.717757940 CET50135445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.717791080 CET4455013445.205.93.159192.168.2.9
                                  Jan 15, 2025 03:00:28.717833996 CET50134445192.168.2.945.205.93.159
                                  Jan 15, 2025 03:00:28.717885971 CET50135445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.718346119 CET50136445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.722723007 CET4455013545.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:28.722786903 CET50135445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.723396063 CET4455013645.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:28.723457098 CET50136445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.723476887 CET50136445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:28.729343891 CET4455013645.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:29.786186934 CET44549771186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:29.786259890 CET49771445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:29.786300898 CET49771445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:29.786375999 CET49771445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:29.791116953 CET44549771186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:29.791129112 CET44549771186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:30.720520973 CET50170445192.168.2.9214.59.95.196
                                  Jan 15, 2025 03:00:30.725310087 CET44550170214.59.95.196192.168.2.9
                                  Jan 15, 2025 03:00:30.725416899 CET50170445192.168.2.9214.59.95.196
                                  Jan 15, 2025 03:00:30.725452900 CET50170445192.168.2.9214.59.95.196
                                  Jan 15, 2025 03:00:30.725667953 CET50171445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.730480909 CET44550170214.59.95.196192.168.2.9
                                  Jan 15, 2025 03:00:30.730539083 CET44550171214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:30.730551958 CET50170445192.168.2.9214.59.95.196
                                  Jan 15, 2025 03:00:30.730612993 CET50171445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.730698109 CET50171445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.730968952 CET50172445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.735774994 CET44550172214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:30.735842943 CET50172445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.735872984 CET50172445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.735970020 CET44550171214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:30.736025095 CET50171445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:30.740732908 CET44550172214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:30.798479080 CET50173445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:30.803371906 CET4455017339.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:30.803453922 CET50173445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:30.803492069 CET50173445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:30.808300018 CET4455017339.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:31.804164886 CET44549809116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:31.804285049 CET49809445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:31.804359913 CET49809445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:31.804447889 CET49809445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:31.809225082 CET44549809116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:31.809331894 CET44549809116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:32.735904932 CET50197445192.168.2.9140.248.62.195
                                  Jan 15, 2025 03:00:32.740823030 CET44550197140.248.62.195192.168.2.9
                                  Jan 15, 2025 03:00:32.740899086 CET50197445192.168.2.9140.248.62.195
                                  Jan 15, 2025 03:00:32.740969896 CET50197445192.168.2.9140.248.62.195
                                  Jan 15, 2025 03:00:32.741161108 CET50198445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.746036053 CET44550197140.248.62.195192.168.2.9
                                  Jan 15, 2025 03:00:32.746067047 CET44550198140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:32.746099949 CET50197445192.168.2.9140.248.62.195
                                  Jan 15, 2025 03:00:32.746146917 CET50198445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.746187925 CET50198445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.746444941 CET50199445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.751162052 CET44550198140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:32.751219988 CET50198445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.751362085 CET44550199140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:32.751415968 CET50199445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.752433062 CET50199445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:32.757275105 CET44550199140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:32.798369884 CET50200445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:32.803236008 CET44550200186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:32.803328991 CET50200445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:32.803368092 CET50200445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:32.808173895 CET44550200186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:33.806498051 CET44549845137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:33.806597948 CET49845445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:33.806678057 CET49845445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:33.806752920 CET49845445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:33.811495066 CET44549845137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:33.811506033 CET44549845137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:34.770513058 CET50214445192.168.2.955.83.78.189
                                  Jan 15, 2025 03:00:34.775307894 CET4455021455.83.78.189192.168.2.9
                                  Jan 15, 2025 03:00:34.775393009 CET50214445192.168.2.955.83.78.189
                                  Jan 15, 2025 03:00:34.778177977 CET50214445192.168.2.955.83.78.189
                                  Jan 15, 2025 03:00:34.778322935 CET50215445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.782937050 CET4455021455.83.78.189192.168.2.9
                                  Jan 15, 2025 03:00:34.782984972 CET50214445192.168.2.955.83.78.189
                                  Jan 15, 2025 03:00:34.783058882 CET4455021555.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:34.783114910 CET50215445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.786506891 CET50215445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.790390968 CET50216445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.791287899 CET4455021555.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:34.791340113 CET50215445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.795278072 CET4455021655.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:34.795346022 CET50216445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.798712015 CET50216445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:34.803504944 CET4455021655.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:34.815327883 CET50217445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:34.820152044 CET44550217116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:34.820213079 CET50217445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:34.822838068 CET50217445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:34.827615023 CET44550217116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:35.870615005 CET4454988138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:35.870759010 CET49881445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:35.870824099 CET49881445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:35.870893955 CET49881445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:35.875622034 CET4454988138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:35.875672102 CET4454988138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:36.767474890 CET50230445192.168.2.988.104.196.136
                                  Jan 15, 2025 03:00:36.773694992 CET4455023088.104.196.136192.168.2.9
                                  Jan 15, 2025 03:00:36.773809910 CET50230445192.168.2.988.104.196.136
                                  Jan 15, 2025 03:00:36.773823023 CET50230445192.168.2.988.104.196.136
                                  Jan 15, 2025 03:00:36.773910046 CET50231445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.780067921 CET4455023188.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:36.780164957 CET50231445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.780164957 CET50231445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.780189037 CET4455023088.104.196.136192.168.2.9
                                  Jan 15, 2025 03:00:36.780574083 CET50232445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.780627012 CET50230445192.168.2.988.104.196.136
                                  Jan 15, 2025 03:00:36.786510944 CET4455023188.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:36.786570072 CET50231445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.786717892 CET4455023288.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:36.786789894 CET50232445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.786834002 CET50232445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:36.791604996 CET4455023288.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:36.813867092 CET50234445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:36.818697929 CET44550234137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:36.818794966 CET50234445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:36.818823099 CET50234445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:36.823771954 CET44550234137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:37.853370905 CET4454991888.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:37.853444099 CET49918445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:37.853503942 CET49918445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:37.853585958 CET49918445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:37.858237028 CET4454991888.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:37.858319044 CET4454991888.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:38.783103943 CET50248445192.168.2.9126.215.235.138
                                  Jan 15, 2025 03:00:38.787981987 CET44550248126.215.235.138192.168.2.9
                                  Jan 15, 2025 03:00:38.788173914 CET50248445192.168.2.9126.215.235.138
                                  Jan 15, 2025 03:00:38.788242102 CET50248445192.168.2.9126.215.235.138
                                  Jan 15, 2025 03:00:38.788546085 CET50249445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.793252945 CET44550248126.215.235.138192.168.2.9
                                  Jan 15, 2025 03:00:38.793314934 CET44550249126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:38.793363094 CET50248445192.168.2.9126.215.235.138
                                  Jan 15, 2025 03:00:38.793376923 CET50249445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.793493032 CET50249445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.793898106 CET50250445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.798265934 CET44550249126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:38.798327923 CET50249445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.798686028 CET44550250126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:38.798799038 CET50250445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.798799038 CET50250445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:38.803644896 CET44550250126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:38.876400948 CET50251445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:38.882829905 CET4455025138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:38.882934093 CET50251445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:38.882972002 CET50251445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:00:38.889473915 CET4455025138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:00:40.317972898 CET44549954153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:40.318057060 CET49954445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:40.318099976 CET49954445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:40.318149090 CET49954445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:40.322838068 CET44549954153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:40.322889090 CET44549954153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:40.747956038 CET44550250126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:40.748032093 CET50250445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:40.748075008 CET50250445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:40.748092890 CET50250445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:40.752901077 CET44550250126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:40.752917051 CET44550250126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:40.798661947 CET50263445192.168.2.9117.57.238.154
                                  Jan 15, 2025 03:00:40.803527117 CET44550263117.57.238.154192.168.2.9
                                  Jan 15, 2025 03:00:40.803663015 CET50263445192.168.2.9117.57.238.154
                                  Jan 15, 2025 03:00:40.803786993 CET50263445192.168.2.9117.57.238.154
                                  Jan 15, 2025 03:00:40.803992033 CET50264445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.808602095 CET44550263117.57.238.154192.168.2.9
                                  Jan 15, 2025 03:00:40.808701992 CET50263445192.168.2.9117.57.238.154
                                  Jan 15, 2025 03:00:40.808828115 CET44550264117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:00:40.808901072 CET50264445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.809015989 CET50264445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.809391022 CET50265445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.813788891 CET44550264117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:00:40.813848019 CET50264445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.814227104 CET44550265117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:00:40.814291000 CET50265445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.814316034 CET50265445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:00:40.819114923 CET44550265117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:00:40.860821009 CET50266445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:40.865662098 CET4455026688.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:40.865744114 CET50266445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:40.865788937 CET50266445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:00:40.870551109 CET4455026688.249.236.1192.168.2.9
                                  Jan 15, 2025 03:00:42.037684917 CET44549994113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:42.037795067 CET49994445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:42.037884951 CET49994445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:42.037947893 CET49994445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:42.044276953 CET44549994113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:42.044292927 CET44549994113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:42.702047110 CET50281445192.168.2.9180.237.129.153
                                  Jan 15, 2025 03:00:42.707362890 CET44550281180.237.129.153192.168.2.9
                                  Jan 15, 2025 03:00:42.707423925 CET50281445192.168.2.9180.237.129.153
                                  Jan 15, 2025 03:00:42.707531929 CET50281445192.168.2.9180.237.129.153
                                  Jan 15, 2025 03:00:42.707891941 CET50282445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.712321997 CET44550281180.237.129.153192.168.2.9
                                  Jan 15, 2025 03:00:42.712435007 CET44550281180.237.129.153192.168.2.9
                                  Jan 15, 2025 03:00:42.712472916 CET50281445192.168.2.9180.237.129.153
                                  Jan 15, 2025 03:00:42.712708950 CET44550282180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:00:42.712783098 CET50282445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.713032961 CET50282445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.717803001 CET44550282180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:00:42.717854023 CET50282445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.718581915 CET50283445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.723350048 CET44550283180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:00:42.723419905 CET50283445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.726469040 CET50283445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:00:42.732806921 CET44550283180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:00:43.329830885 CET50285445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:43.334779978 CET44550285153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:43.334870100 CET50285445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:43.339698076 CET50285445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:00:43.344531059 CET44550285153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:00:43.751363993 CET50290445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:43.756230116 CET44550290126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:43.756330967 CET50290445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:43.756373882 CET50290445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:43.761149883 CET44550290126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:44.037709951 CET44550027119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:44.038568974 CET50027445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:44.038614988 CET50027445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:44.038635969 CET50027445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:44.043422937 CET44550027119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:44.043435097 CET44550027119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:44.454925060 CET50296445192.168.2.926.180.111.29
                                  Jan 15, 2025 03:00:44.459960938 CET4455029626.180.111.29192.168.2.9
                                  Jan 15, 2025 03:00:44.460150957 CET50296445192.168.2.926.180.111.29
                                  Jan 15, 2025 03:00:44.460266113 CET50296445192.168.2.926.180.111.29
                                  Jan 15, 2025 03:00:44.460266113 CET50297445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:00:44.465173960 CET4455029726.180.111.1192.168.2.9
                                  Jan 15, 2025 03:00:44.465193033 CET4455029626.180.111.29192.168.2.9
                                  Jan 15, 2025 03:00:44.465327978 CET50296445192.168.2.926.180.111.29
                                  Jan 15, 2025 03:00:44.465328932 CET50297445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:00:44.465825081 CET50298445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:00:44.470401049 CET4455029726.180.111.1192.168.2.9
                                  Jan 15, 2025 03:00:44.470520020 CET50297445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:00:44.470695972 CET4455029826.180.111.1192.168.2.9
                                  Jan 15, 2025 03:00:44.470774889 CET50298445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:00:44.470851898 CET50298445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:00:44.475631952 CET4455029826.180.111.1192.168.2.9
                                  Jan 15, 2025 03:00:45.048419952 CET50301445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:45.053364992 CET44550301113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:45.053570032 CET50301445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:45.053649902 CET50301445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:00:45.058367968 CET44550301113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:00:45.758147955 CET44550290126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:45.758254051 CET50290445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:45.758254051 CET50290445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:45.758292913 CET50290445192.168.2.9126.215.235.1
                                  Jan 15, 2025 03:00:45.763103962 CET44550290126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:45.763118029 CET44550290126.215.235.1192.168.2.9
                                  Jan 15, 2025 03:00:45.813992977 CET50302445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.818840981 CET44550302126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:00:45.818901062 CET50302445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.818968058 CET50302445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.819422007 CET50303445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.823869944 CET44550302126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:00:45.823961973 CET50302445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.824251890 CET44550303126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:00:45.824302912 CET50303445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.824337006 CET50303445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:00:45.829130888 CET44550303126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:00:46.072097063 CET4455006480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:46.074615955 CET50064445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:46.074657917 CET50064445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:46.074702978 CET50064445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:46.079469919 CET4455006480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:46.079482079 CET4455006480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:46.099148989 CET50304445192.168.2.9212.96.223.167
                                  Jan 15, 2025 03:00:46.104219913 CET44550304212.96.223.167192.168.2.9
                                  Jan 15, 2025 03:00:46.106596947 CET50304445192.168.2.9212.96.223.167
                                  Jan 15, 2025 03:00:46.106667042 CET50304445192.168.2.9212.96.223.167
                                  Jan 15, 2025 03:00:46.106851101 CET50305445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.111607075 CET44550304212.96.223.167192.168.2.9
                                  Jan 15, 2025 03:00:46.111685991 CET44550305212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:00:46.111757994 CET50304445192.168.2.9212.96.223.167
                                  Jan 15, 2025 03:00:46.111779928 CET50305445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.111895084 CET50305445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.112255096 CET50306445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.116875887 CET44550305212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:00:46.117068052 CET44550306212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:00:46.117136002 CET50305445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.117171049 CET50306445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.117223024 CET50306445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:00:46.121993065 CET44550306212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:00:47.048310041 CET50307445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:47.053394079 CET44550307119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:47.053524971 CET50307445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:47.054543972 CET50307445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:00:47.059286118 CET44550307119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:00:47.626986980 CET50308445192.168.2.9123.191.147.102
                                  Jan 15, 2025 03:00:47.632886887 CET44550308123.191.147.102192.168.2.9
                                  Jan 15, 2025 03:00:47.633088112 CET50308445192.168.2.9123.191.147.102
                                  Jan 15, 2025 03:00:47.633167028 CET50308445192.168.2.9123.191.147.102
                                  Jan 15, 2025 03:00:47.633359909 CET50309445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.639096022 CET44550309123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:00:47.639157057 CET44550308123.191.147.102192.168.2.9
                                  Jan 15, 2025 03:00:47.639173985 CET50309445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.639185905 CET50309445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.639213085 CET50308445192.168.2.9123.191.147.102
                                  Jan 15, 2025 03:00:47.639590025 CET50310445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.645273924 CET44550310123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:00:47.645328999 CET44550309123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:00:47.645380974 CET50310445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.645396948 CET50309445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.645493984 CET50310445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:00:47.650556087 CET44550310123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:00:48.072123051 CET44550097164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:48.072227955 CET50097445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:48.108419895 CET50097445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:48.108480930 CET50097445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:48.113297939 CET44550097164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:48.113312006 CET44550097164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:49.048746109 CET50311445192.168.2.974.192.72.238
                                  Jan 15, 2025 03:00:49.055161953 CET4455031174.192.72.238192.168.2.9
                                  Jan 15, 2025 03:00:49.055309057 CET50311445192.168.2.974.192.72.238
                                  Jan 15, 2025 03:00:49.055355072 CET50311445192.168.2.974.192.72.238
                                  Jan 15, 2025 03:00:49.055578947 CET50312445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.061821938 CET4455031274.192.72.1192.168.2.9
                                  Jan 15, 2025 03:00:49.061918974 CET4455031174.192.72.238192.168.2.9
                                  Jan 15, 2025 03:00:49.061947107 CET50312445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.061981916 CET50311445192.168.2.974.192.72.238
                                  Jan 15, 2025 03:00:49.062140942 CET50312445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.062587976 CET50313445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.069053888 CET4455031274.192.72.1192.168.2.9
                                  Jan 15, 2025 03:00:49.069066048 CET4455031374.192.72.1192.168.2.9
                                  Jan 15, 2025 03:00:49.069129944 CET50312445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.069214106 CET50313445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.069263935 CET50313445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:00:49.075253010 CET4455031374.192.72.1192.168.2.9
                                  Jan 15, 2025 03:00:49.079653978 CET50314445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:49.086066961 CET4455031480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:49.086318970 CET50314445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:49.086318970 CET50314445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:00:49.092631102 CET4455031480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:00:50.085844040 CET4455013645.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:50.085972071 CET50136445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:50.086014986 CET50136445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:50.086061001 CET50136445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:50.090815067 CET4455013645.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:50.090825081 CET4455013645.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:50.376775026 CET50315445192.168.2.9135.236.167.35
                                  Jan 15, 2025 03:00:50.381623030 CET44550315135.236.167.35192.168.2.9
                                  Jan 15, 2025 03:00:50.381762028 CET50315445192.168.2.9135.236.167.35
                                  Jan 15, 2025 03:00:50.387121916 CET50315445192.168.2.9135.236.167.35
                                  Jan 15, 2025 03:00:50.387362957 CET50316445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.391923904 CET44550315135.236.167.35192.168.2.9
                                  Jan 15, 2025 03:00:50.391984940 CET50315445192.168.2.9135.236.167.35
                                  Jan 15, 2025 03:00:50.392112017 CET44550316135.236.167.1192.168.2.9
                                  Jan 15, 2025 03:00:50.392167091 CET50316445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.392214060 CET50316445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.392659903 CET50317445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.397077084 CET44550316135.236.167.1192.168.2.9
                                  Jan 15, 2025 03:00:50.397138119 CET50316445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.397495985 CET44550317135.236.167.1192.168.2.9
                                  Jan 15, 2025 03:00:50.397555113 CET50317445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.397587061 CET50317445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:00:50.402287960 CET44550317135.236.167.1192.168.2.9
                                  Jan 15, 2025 03:00:51.135822058 CET50318445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:51.140805006 CET44550318164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:51.140881062 CET50318445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:51.140917063 CET50318445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:00:51.145778894 CET44550318164.216.112.1192.168.2.9
                                  Jan 15, 2025 03:00:51.611001968 CET50319445192.168.2.9192.4.121.112
                                  Jan 15, 2025 03:00:51.616003036 CET44550319192.4.121.112192.168.2.9
                                  Jan 15, 2025 03:00:51.616081953 CET50319445192.168.2.9192.4.121.112
                                  Jan 15, 2025 03:00:51.616168022 CET50319445192.168.2.9192.4.121.112
                                  Jan 15, 2025 03:00:51.616396904 CET50320445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.621094942 CET44550319192.4.121.112192.168.2.9
                                  Jan 15, 2025 03:00:51.621153116 CET50319445192.168.2.9192.4.121.112
                                  Jan 15, 2025 03:00:51.621351004 CET44550320192.4.121.1192.168.2.9
                                  Jan 15, 2025 03:00:51.621421099 CET50320445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.621509075 CET50320445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.621890068 CET50321445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.626418114 CET44550320192.4.121.1192.168.2.9
                                  Jan 15, 2025 03:00:51.626467943 CET50320445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.626729965 CET44550321192.4.121.1192.168.2.9
                                  Jan 15, 2025 03:00:51.626830101 CET50321445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.626830101 CET50321445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:00:51.632988930 CET44550321192.4.121.1192.168.2.9
                                  Jan 15, 2025 03:00:52.084316969 CET44550172214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:52.084404945 CET50172445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:52.084448099 CET50172445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:52.084495068 CET50172445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:52.089312077 CET44550172214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:52.089323997 CET44550172214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:52.178052902 CET4455017339.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:52.178153038 CET50173445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:52.178240061 CET50173445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:52.178297997 CET50173445192.168.2.939.14.91.1
                                  Jan 15, 2025 03:00:52.183021069 CET4455017339.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:52.183032990 CET4455017339.14.91.1192.168.2.9
                                  Jan 15, 2025 03:00:52.235987902 CET50322445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.240860939 CET4455032239.14.91.2192.168.2.9
                                  Jan 15, 2025 03:00:52.243959904 CET50322445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.244008064 CET50322445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.244338989 CET50323445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.248995066 CET4455032239.14.91.2192.168.2.9
                                  Jan 15, 2025 03:00:52.249130964 CET4455032339.14.91.2192.168.2.9
                                  Jan 15, 2025 03:00:52.249193907 CET50322445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.249223948 CET50323445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.249237061 CET50323445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:00:52.254081964 CET4455032339.14.91.2192.168.2.9
                                  Jan 15, 2025 03:00:52.767255068 CET50324445192.168.2.993.154.76.240
                                  Jan 15, 2025 03:00:52.772325039 CET4455032493.154.76.240192.168.2.9
                                  Jan 15, 2025 03:00:52.772435904 CET50324445192.168.2.993.154.76.240
                                  Jan 15, 2025 03:00:52.772490025 CET50324445192.168.2.993.154.76.240
                                  Jan 15, 2025 03:00:52.772612095 CET50325445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.777410030 CET4455032493.154.76.240192.168.2.9
                                  Jan 15, 2025 03:00:52.777489901 CET4455032593.154.76.1192.168.2.9
                                  Jan 15, 2025 03:00:52.777539015 CET50324445192.168.2.993.154.76.240
                                  Jan 15, 2025 03:00:52.777560949 CET50325445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.777642012 CET50325445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.777899981 CET50326445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.782546043 CET4455032593.154.76.1192.168.2.9
                                  Jan 15, 2025 03:00:52.782598019 CET50325445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.782716036 CET4455032693.154.76.1192.168.2.9
                                  Jan 15, 2025 03:00:52.782780886 CET50326445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.782828093 CET50326445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:00:52.787655115 CET4455032693.154.76.1192.168.2.9
                                  Jan 15, 2025 03:00:53.095269918 CET50327445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:53.101239920 CET4455032745.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:53.101412058 CET50327445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:53.101412058 CET50327445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:00:53.106343031 CET4455032745.205.93.1192.168.2.9
                                  Jan 15, 2025 03:00:53.851334095 CET50328445192.168.2.937.113.179.227
                                  Jan 15, 2025 03:00:53.856739044 CET4455032837.113.179.227192.168.2.9
                                  Jan 15, 2025 03:00:53.857181072 CET50328445192.168.2.937.113.179.227
                                  Jan 15, 2025 03:00:53.859467983 CET50328445192.168.2.937.113.179.227
                                  Jan 15, 2025 03:00:53.859514952 CET50329445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.864392996 CET4455032937.113.179.1192.168.2.9
                                  Jan 15, 2025 03:00:53.864418030 CET4455032837.113.179.227192.168.2.9
                                  Jan 15, 2025 03:00:53.864439011 CET4455032837.113.179.227192.168.2.9
                                  Jan 15, 2025 03:00:53.864461899 CET50329445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.864583969 CET50328445192.168.2.937.113.179.227
                                  Jan 15, 2025 03:00:53.867126942 CET50329445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.867403030 CET50330445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.871880054 CET4455032937.113.179.1192.168.2.9
                                  Jan 15, 2025 03:00:53.871974945 CET50329445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.872236013 CET4455033037.113.179.1192.168.2.9
                                  Jan 15, 2025 03:00:53.872289896 CET50330445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.875211000 CET50330445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:00:53.880074978 CET4455033037.113.179.1192.168.2.9
                                  Jan 15, 2025 03:00:54.132966042 CET44550199140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:54.133033037 CET50199445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:54.133121014 CET50199445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:54.133157969 CET50199445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:54.138705015 CET44550199140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:54.138720989 CET44550199140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:54.165090084 CET44550200186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:54.165149927 CET50200445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:54.166390896 CET50200445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:54.166440964 CET50200445192.168.2.9186.236.250.1
                                  Jan 15, 2025 03:00:54.171307087 CET44550200186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:54.171363115 CET44550200186.236.250.1192.168.2.9
                                  Jan 15, 2025 03:00:54.235970974 CET50331445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.243565083 CET44550331186.236.250.2192.168.2.9
                                  Jan 15, 2025 03:00:54.243653059 CET50331445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.243726969 CET50331445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.244133949 CET50332445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.251424074 CET44550332186.236.250.2192.168.2.9
                                  Jan 15, 2025 03:00:54.251436949 CET44550331186.236.250.2192.168.2.9
                                  Jan 15, 2025 03:00:54.251492023 CET50332445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.251523972 CET50331445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.251607895 CET50332445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:00:54.258148909 CET44550332186.236.250.2192.168.2.9
                                  Jan 15, 2025 03:00:54.861100912 CET50333445192.168.2.941.140.190.234
                                  Jan 15, 2025 03:00:54.866337061 CET4455033341.140.190.234192.168.2.9
                                  Jan 15, 2025 03:00:54.866472960 CET50333445192.168.2.941.140.190.234
                                  Jan 15, 2025 03:00:54.866518021 CET50333445192.168.2.941.140.190.234
                                  Jan 15, 2025 03:00:54.866760015 CET50334445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.871587992 CET4455033341.140.190.234192.168.2.9
                                  Jan 15, 2025 03:00:54.871661901 CET50333445192.168.2.941.140.190.234
                                  Jan 15, 2025 03:00:54.871721029 CET4455033441.140.190.1192.168.2.9
                                  Jan 15, 2025 03:00:54.871779919 CET50334445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.871805906 CET50334445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.872270107 CET50335445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.876847029 CET4455033441.140.190.1192.168.2.9
                                  Jan 15, 2025 03:00:54.876913071 CET50334445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.877163887 CET4455033541.140.190.1192.168.2.9
                                  Jan 15, 2025 03:00:54.877424002 CET50335445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.877424002 CET50335445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:00:54.882349014 CET4455033541.140.190.1192.168.2.9
                                  Jan 15, 2025 03:00:55.095149040 CET50336445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:55.100065947 CET44550336214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:55.100198984 CET50336445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:55.100214005 CET50336445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:00:55.105077982 CET44550336214.59.95.1192.168.2.9
                                  Jan 15, 2025 03:00:55.235722065 CET4970580192.168.2.9199.232.214.172
                                  Jan 15, 2025 03:00:55.240859985 CET8049705199.232.214.172192.168.2.9
                                  Jan 15, 2025 03:00:55.240951061 CET4970580192.168.2.9199.232.214.172
                                  Jan 15, 2025 03:00:55.798585892 CET50337445192.168.2.914.12.50.252
                                  Jan 15, 2025 03:00:55.803639889 CET4455033714.12.50.252192.168.2.9
                                  Jan 15, 2025 03:00:55.803769112 CET50337445192.168.2.914.12.50.252
                                  Jan 15, 2025 03:00:55.803848028 CET50337445192.168.2.914.12.50.252
                                  Jan 15, 2025 03:00:55.804107904 CET50338445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.808808088 CET4455033714.12.50.252192.168.2.9
                                  Jan 15, 2025 03:00:55.808892012 CET4455033814.12.50.1192.168.2.9
                                  Jan 15, 2025 03:00:55.808967113 CET50337445192.168.2.914.12.50.252
                                  Jan 15, 2025 03:00:55.809024096 CET50338445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.809223890 CET50338445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.809777021 CET50339445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.814116001 CET4455033814.12.50.1192.168.2.9
                                  Jan 15, 2025 03:00:55.814232111 CET50338445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.814704895 CET4455033914.12.50.1192.168.2.9
                                  Jan 15, 2025 03:00:55.814773083 CET50339445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.814832926 CET50339445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:00:55.819678068 CET4455033914.12.50.1192.168.2.9
                                  Jan 15, 2025 03:00:56.178579092 CET44550217116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:56.178674936 CET50217445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:56.178738117 CET50217445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:56.178797007 CET50217445192.168.2.9116.25.141.1
                                  Jan 15, 2025 03:00:56.178822041 CET4455021655.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:56.178875923 CET50216445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:56.178910971 CET50216445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:56.178966999 CET50216445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:56.183733940 CET44550217116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:56.183765888 CET44550217116.25.141.1192.168.2.9
                                  Jan 15, 2025 03:00:56.183912039 CET4455021655.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:56.183940887 CET4455021655.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:56.236325026 CET50340445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.244043112 CET44550340116.25.141.2192.168.2.9
                                  Jan 15, 2025 03:00:56.244115114 CET50340445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.244165897 CET50340445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.244689941 CET50341445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.249438047 CET44550341116.25.141.2192.168.2.9
                                  Jan 15, 2025 03:00:56.249504089 CET50341445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.249556065 CET50341445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.252557039 CET44550340116.25.141.2192.168.2.9
                                  Jan 15, 2025 03:00:56.252610922 CET50340445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:00:56.254338026 CET44550341116.25.141.2192.168.2.9
                                  Jan 15, 2025 03:00:56.914984941 CET50342445192.168.2.974.144.36.140
                                  Jan 15, 2025 03:00:56.919895887 CET4455034274.144.36.140192.168.2.9
                                  Jan 15, 2025 03:00:56.919970989 CET50342445192.168.2.974.144.36.140
                                  Jan 15, 2025 03:00:56.919997931 CET50342445192.168.2.974.144.36.140
                                  Jan 15, 2025 03:00:56.920245886 CET50343445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.925039053 CET4455034274.144.36.140192.168.2.9
                                  Jan 15, 2025 03:00:56.925093889 CET50342445192.168.2.974.144.36.140
                                  Jan 15, 2025 03:00:56.925101042 CET4455034374.144.36.1192.168.2.9
                                  Jan 15, 2025 03:00:56.925162077 CET50343445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.925342083 CET50343445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.930171967 CET4455034374.144.36.1192.168.2.9
                                  Jan 15, 2025 03:00:56.930227041 CET50343445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.983588934 CET50344445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.988594055 CET4455034474.144.36.1192.168.2.9
                                  Jan 15, 2025 03:00:56.988667965 CET50344445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.988739014 CET50344445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:00:56.993539095 CET4455034474.144.36.1192.168.2.9
                                  Jan 15, 2025 03:00:57.141999960 CET50346445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:57.146805048 CET44550346140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:57.146874905 CET50346445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:57.146919966 CET50346445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:00:57.151690960 CET44550346140.248.62.1192.168.2.9
                                  Jan 15, 2025 03:00:57.736211061 CET50347445192.168.2.920.55.204.178
                                  Jan 15, 2025 03:00:57.742635012 CET4455034720.55.204.178192.168.2.9
                                  Jan 15, 2025 03:00:57.742713928 CET50347445192.168.2.920.55.204.178
                                  Jan 15, 2025 03:00:57.742799997 CET50347445192.168.2.920.55.204.178
                                  Jan 15, 2025 03:00:57.742990017 CET50348445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.749332905 CET4455034720.55.204.178192.168.2.9
                                  Jan 15, 2025 03:00:57.749391079 CET50347445192.168.2.920.55.204.178
                                  Jan 15, 2025 03:00:57.749486923 CET4455034820.55.204.1192.168.2.9
                                  Jan 15, 2025 03:00:57.749556065 CET50348445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.749577045 CET50348445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.749950886 CET50349445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.754581928 CET4455034820.55.204.1192.168.2.9
                                  Jan 15, 2025 03:00:57.754669905 CET50348445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.754856110 CET4455034920.55.204.1192.168.2.9
                                  Jan 15, 2025 03:00:57.754923105 CET50349445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.754959106 CET50349445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:00:57.759757996 CET4455034920.55.204.1192.168.2.9
                                  Jan 15, 2025 03:00:58.162331104 CET4455023288.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:58.165518999 CET50232445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:58.165666103 CET50232445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:58.165720940 CET50232445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:00:58.170548916 CET4455023288.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:58.170903921 CET4455023288.104.196.1192.168.2.9
                                  Jan 15, 2025 03:00:58.177762985 CET44550234137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:58.180659056 CET50234445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:58.180721998 CET50234445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:58.180778980 CET50234445192.168.2.9137.156.254.1
                                  Jan 15, 2025 03:00:58.185471058 CET44550234137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:58.185553074 CET44550234137.156.254.1192.168.2.9
                                  Jan 15, 2025 03:00:58.236183882 CET50350445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.241063118 CET44550350137.156.254.2192.168.2.9
                                  Jan 15, 2025 03:00:58.241174936 CET50350445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.241250038 CET50350445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.241714954 CET50351445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.246151924 CET44550350137.156.254.2192.168.2.9
                                  Jan 15, 2025 03:00:58.246212006 CET50350445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.246606112 CET44550351137.156.254.2192.168.2.9
                                  Jan 15, 2025 03:00:58.246825933 CET50351445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.247055054 CET50351445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:00:58.251854897 CET44550351137.156.254.2192.168.2.9
                                  Jan 15, 2025 03:00:58.501722097 CET50352445192.168.2.9206.238.32.234
                                  Jan 15, 2025 03:00:58.506808043 CET44550352206.238.32.234192.168.2.9
                                  Jan 15, 2025 03:00:58.507204056 CET50352445192.168.2.9206.238.32.234
                                  Jan 15, 2025 03:00:58.507204056 CET50352445192.168.2.9206.238.32.234
                                  Jan 15, 2025 03:00:58.507349014 CET50353445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.512259960 CET44550353206.238.32.1192.168.2.9
                                  Jan 15, 2025 03:00:58.512314081 CET44550352206.238.32.234192.168.2.9
                                  Jan 15, 2025 03:00:58.512326002 CET50353445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.512409925 CET50352445192.168.2.9206.238.32.234
                                  Jan 15, 2025 03:00:58.512466908 CET50353445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.512739897 CET50354445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.517301083 CET44550353206.238.32.1192.168.2.9
                                  Jan 15, 2025 03:00:58.517435074 CET50353445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.517627001 CET44550354206.238.32.1192.168.2.9
                                  Jan 15, 2025 03:00:58.517692089 CET50354445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.517719984 CET50354445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:00:58.522542000 CET44550354206.238.32.1192.168.2.9
                                  Jan 15, 2025 03:00:59.189017057 CET50355445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:59.193775892 CET4455035555.83.78.1192.168.2.9
                                  Jan 15, 2025 03:00:59.193870068 CET50355445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:59.193905115 CET50355445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:00:59.198668957 CET4455035555.83.78.1192.168.2.9
                                  Jan 15, 2025 03:01:00.241264105 CET4455025138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:01:00.241395950 CET50251445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:01:00.241463900 CET50251445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:01:00.241525888 CET50251445192.168.2.938.185.104.1
                                  Jan 15, 2025 03:01:00.246263027 CET4455025138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:01:00.246287107 CET4455025138.185.104.1192.168.2.9
                                  Jan 15, 2025 03:01:00.298398972 CET50358445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.303560019 CET4455035838.185.104.2192.168.2.9
                                  Jan 15, 2025 03:01:00.303654909 CET50358445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.303689003 CET50358445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.304016113 CET50359445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.308641911 CET4455035838.185.104.2192.168.2.9
                                  Jan 15, 2025 03:01:00.308706045 CET50358445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.308794975 CET4455035938.185.104.2192.168.2.9
                                  Jan 15, 2025 03:01:00.308850050 CET50359445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.308890104 CET50359445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:00.313648939 CET4455035938.185.104.2192.168.2.9
                                  Jan 15, 2025 03:01:01.173486948 CET50364445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:01:01.178406000 CET4455036488.104.196.1192.168.2.9
                                  Jan 15, 2025 03:01:01.178531885 CET50364445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:01:01.178553104 CET50364445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:01:01.183394909 CET4455036488.104.196.1192.168.2.9
                                  Jan 15, 2025 03:01:02.197673082 CET44550265117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:01:02.197819948 CET50265445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:02.225594997 CET4455026688.249.236.1192.168.2.9
                                  Jan 15, 2025 03:01:02.225743055 CET50266445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:01:02.249613047 CET50265445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:02.249641895 CET50265445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:02.249715090 CET50266445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:01:02.249769926 CET50266445192.168.2.988.249.236.1
                                  Jan 15, 2025 03:01:02.254512072 CET44550265117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:01:02.254523993 CET44550265117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:01:02.254571915 CET4455026688.249.236.1192.168.2.9
                                  Jan 15, 2025 03:01:02.254580975 CET4455026688.249.236.1192.168.2.9
                                  Jan 15, 2025 03:01:02.424474955 CET50371445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.429261923 CET4455037188.249.236.2192.168.2.9
                                  Jan 15, 2025 03:01:02.429337025 CET50371445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.432193995 CET50371445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.435967922 CET50372445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.437367916 CET4455037188.249.236.2192.168.2.9
                                  Jan 15, 2025 03:01:02.437417984 CET50371445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.440777063 CET4455037288.249.236.2192.168.2.9
                                  Jan 15, 2025 03:01:02.440854073 CET50372445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.440866947 CET50372445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:02.445641041 CET4455037288.249.236.2192.168.2.9
                                  Jan 15, 2025 03:01:04.115499973 CET44550283180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:01:04.115650892 CET50283445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:04.115722895 CET50283445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:04.115768909 CET50283445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:04.120531082 CET44550283180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:01:04.120543957 CET44550283180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:01:04.729023933 CET44550285153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:01:04.729212046 CET50285445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:01:04.729254961 CET50285445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:01:04.729289055 CET50285445192.168.2.9153.68.53.1
                                  Jan 15, 2025 03:01:04.734440088 CET44550285153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:01:04.734477997 CET44550285153.68.53.1192.168.2.9
                                  Jan 15, 2025 03:01:04.783104897 CET50394445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.788130999 CET44550394153.68.53.2192.168.2.9
                                  Jan 15, 2025 03:01:04.788274050 CET50394445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.788348913 CET50394445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.788687944 CET50395445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.793279886 CET44550394153.68.53.2192.168.2.9
                                  Jan 15, 2025 03:01:04.793411970 CET50394445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.793541908 CET44550395153.68.53.2192.168.2.9
                                  Jan 15, 2025 03:01:04.793674946 CET50395445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.793759108 CET50395445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:04.798577070 CET44550395153.68.53.2192.168.2.9
                                  Jan 15, 2025 03:01:05.260976076 CET50402445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:05.266028881 CET44550402117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:01:05.266104937 CET50402445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:05.268795013 CET50402445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:05.273762941 CET44550402117.57.238.1192.168.2.9
                                  Jan 15, 2025 03:01:05.850680113 CET4455029826.180.111.1192.168.2.9
                                  Jan 15, 2025 03:01:05.850754023 CET50298445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:05.850785017 CET50298445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:05.850831985 CET50298445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:05.855600119 CET4455029826.180.111.1192.168.2.9
                                  Jan 15, 2025 03:01:05.855616093 CET4455029826.180.111.1192.168.2.9
                                  Jan 15, 2025 03:01:06.428236008 CET44550301113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:01:06.428327084 CET50301445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:01:06.428361893 CET50301445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:01:06.428381920 CET50301445192.168.2.9113.123.253.1
                                  Jan 15, 2025 03:01:06.435142040 CET44550301113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:01:06.435158968 CET44550301113.123.253.1192.168.2.9
                                  Jan 15, 2025 03:01:06.485889912 CET50422445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:06.490847111 CET44550422113.123.253.2192.168.2.9
                                  Jan 15, 2025 03:01:06.490993977 CET50422445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:06.491044998 CET50422445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:06.491424084 CET50423445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:06.496385098 CET44550423113.123.253.2192.168.2.9
                                  Jan 15, 2025 03:01:06.496403933 CET44550422113.123.253.2192.168.2.9
                                  Jan 15, 2025 03:01:06.496495962 CET50423445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:06.496535063 CET50423445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:06.501318932 CET44550423113.123.253.2192.168.2.9
                                  Jan 15, 2025 03:01:06.507518053 CET44550422113.123.253.2192.168.2.9
                                  Jan 15, 2025 03:01:06.507586002 CET50422445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:07.126374960 CET50438445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:07.131347895 CET44550438180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:01:07.131443024 CET50438445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:07.131463051 CET50438445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:07.136231899 CET44550438180.237.129.1192.168.2.9
                                  Jan 15, 2025 03:01:07.193273067 CET44550303126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:01:07.193336964 CET50303445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:01:07.193377972 CET50303445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:01:07.193403006 CET50303445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:01:07.198224068 CET44550303126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:01:07.198234081 CET44550303126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:01:07.506548882 CET44550306212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:01:07.506700039 CET50306445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:01:07.506742001 CET50306445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:01:07.506776094 CET50306445192.168.2.9212.96.223.1
                                  Jan 15, 2025 03:01:07.513350964 CET44550306212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:01:07.513699055 CET44550306212.96.223.1192.168.2.9
                                  Jan 15, 2025 03:01:08.449341059 CET44550307119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:01:08.449414015 CET50307445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:01:08.449450016 CET50307445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:01:08.449496984 CET50307445192.168.2.9119.140.230.1
                                  Jan 15, 2025 03:01:08.454309940 CET44550307119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:01:08.454353094 CET44550307119.140.230.1192.168.2.9
                                  Jan 15, 2025 03:01:08.501935959 CET50477445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.506838083 CET44550477119.140.230.2192.168.2.9
                                  Jan 15, 2025 03:01:08.506962061 CET50477445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.507539988 CET50477445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.512599945 CET44550477119.140.230.2192.168.2.9
                                  Jan 15, 2025 03:01:08.512700081 CET50477445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.513068914 CET50479445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.517863989 CET44550479119.140.230.2192.168.2.9
                                  Jan 15, 2025 03:01:08.517946959 CET50479445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.517997026 CET50479445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:08.522787094 CET44550479119.140.230.2192.168.2.9
                                  Jan 15, 2025 03:01:08.860872030 CET50492445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:09.031331062 CET4455049226.180.111.1192.168.2.9
                                  Jan 15, 2025 03:01:09.031495094 CET50492445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:09.031553030 CET50492445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:09.036423922 CET4455049226.180.111.1192.168.2.9
                                  Jan 15, 2025 03:01:09.039491892 CET44550310123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:01:09.039577007 CET50310445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:01:09.039650917 CET50310445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:01:09.039701939 CET50310445192.168.2.9123.191.147.1
                                  Jan 15, 2025 03:01:09.044461012 CET44550310123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:01:09.044478893 CET44550310123.191.147.1192.168.2.9
                                  Jan 15, 2025 03:01:10.204655886 CET50591445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:01:10.214658976 CET44550591126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:01:10.214798927 CET50591445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:01:10.215184927 CET50591445192.168.2.9126.215.235.2
                                  Jan 15, 2025 03:01:10.220105886 CET44550591126.215.235.2192.168.2.9
                                  Jan 15, 2025 03:01:10.444586992 CET4455031480.10.120.1192.168.2.9
                                  Jan 15, 2025 03:01:10.444696903 CET50314445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:01:10.448499918 CET4455031374.192.72.1192.168.2.9
                                  Jan 15, 2025 03:01:10.448553085 CET50313445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:01:11.755772114 CET44550317135.236.167.1192.168.2.9
                                  Jan 15, 2025 03:01:11.755832911 CET50317445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:01:11.979161978 CET50330445192.168.2.937.113.179.1
                                  Jan 15, 2025 03:01:11.979212999 CET50479445192.168.2.9119.140.230.2
                                  Jan 15, 2025 03:01:11.979217052 CET50351445192.168.2.9137.156.254.2
                                  Jan 15, 2025 03:01:11.979257107 CET50332445192.168.2.9186.236.250.2
                                  Jan 15, 2025 03:01:11.979300976 CET50423445192.168.2.9113.123.253.2
                                  Jan 15, 2025 03:01:11.979331017 CET50355445192.168.2.955.83.78.1
                                  Jan 15, 2025 03:01:11.979372025 CET50313445192.168.2.974.192.72.1
                                  Jan 15, 2025 03:01:11.979418993 CET50317445192.168.2.9135.236.167.1
                                  Jan 15, 2025 03:01:11.979439974 CET50318445192.168.2.9164.216.112.1
                                  Jan 15, 2025 03:01:11.979468107 CET50321445192.168.2.9192.4.121.1
                                  Jan 15, 2025 03:01:11.979475021 CET50314445192.168.2.980.10.120.1
                                  Jan 15, 2025 03:01:11.979510069 CET50323445192.168.2.939.14.91.2
                                  Jan 15, 2025 03:01:11.979510069 CET50326445192.168.2.993.154.76.1
                                  Jan 15, 2025 03:01:11.979532957 CET50327445192.168.2.945.205.93.1
                                  Jan 15, 2025 03:01:11.979562998 CET50335445192.168.2.941.140.190.1
                                  Jan 15, 2025 03:01:11.979568958 CET50336445192.168.2.9214.59.95.1
                                  Jan 15, 2025 03:01:11.979599953 CET50339445192.168.2.914.12.50.1
                                  Jan 15, 2025 03:01:11.979618073 CET50341445192.168.2.9116.25.141.2
                                  Jan 15, 2025 03:01:11.979641914 CET50344445192.168.2.974.144.36.1
                                  Jan 15, 2025 03:01:11.979679108 CET50349445192.168.2.920.55.204.1
                                  Jan 15, 2025 03:01:11.979707003 CET50354445192.168.2.9206.238.32.1
                                  Jan 15, 2025 03:01:11.979738951 CET50359445192.168.2.938.185.104.2
                                  Jan 15, 2025 03:01:11.979743958 CET50346445192.168.2.9140.248.62.1
                                  Jan 15, 2025 03:01:11.979806900 CET50364445192.168.2.988.104.196.1
                                  Jan 15, 2025 03:01:11.979840994 CET50372445192.168.2.988.249.236.2
                                  Jan 15, 2025 03:01:11.979897976 CET50402445192.168.2.9117.57.238.1
                                  Jan 15, 2025 03:01:11.979943037 CET50438445192.168.2.9180.237.129.1
                                  Jan 15, 2025 03:01:11.980079889 CET50492445192.168.2.926.180.111.1
                                  Jan 15, 2025 03:01:11.980319023 CET50395445192.168.2.9153.68.53.2
                                  Jan 15, 2025 03:01:11.980638027 CET50591445192.168.2.9126.215.235.2
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 15, 2025 03:00:05.155147076 CET5635453192.168.2.91.1.1.1
                                  Jan 15, 2025 03:00:05.165303946 CET53563541.1.1.1192.168.2.9
                                  Jan 15, 2025 03:00:56.457273960 CET138138192.168.2.9192.168.2.255
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 15, 2025 03:00:05.155147076 CET192.168.2.91.1.1.10x444fStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 15, 2025 03:00:00.752274036 CET1.1.1.1192.168.2.90x1fecNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Jan 15, 2025 03:00:00.752274036 CET1.1.1.1192.168.2.90x1fecNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                  Jan 15, 2025 03:00:05.165303946 CET1.1.1.1192.168.2.90x444fNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                  Jan 15, 2025 03:00:05.165303946 CET1.1.1.1192.168.2.90x444fNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                  • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.949728104.16.167.228807788C:\Windows\mssecsvc.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 15, 2025 03:00:05.176311970 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Jan 15, 2025 03:00:05.636996031 CET778INHTTP/1.1 200 OK
                                  Date: Wed, 15 Jan 2025 02:00:05 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 9022452ad8ccef9d-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.949733104.16.167.228807888C:\Windows\mssecsvc.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 15, 2025 03:00:05.811822891 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Jan 15, 2025 03:00:06.281361103 CET778INHTTP/1.1 200 OK
                                  Date: Wed, 15 Jan 2025 02:00:06 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 9022452ed93b4291-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.949760104.16.167.228808048C:\Windows\mssecsvc.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 15, 2025 03:00:07.792748928 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Jan 15, 2025 03:00:08.286416054 CET778INHTTP/1.1 200 OK
                                  Date: Wed, 15 Jan 2025 02:00:08 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 9022453b5ab58c7d-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:21:00:03
                                  Start date:14/01/2025
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll"
                                  Imagebase:0x760000
                                  File size:126'464 bytes
                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:1
                                  Start time:21:00:03
                                  Start date:14/01/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff70f010000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:21:00:03
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1
                                  Imagebase:0xc50000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:21:00:03
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\xjljKPlxqO.dll,PlayGame
                                  Imagebase:0x430000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:21:00:03
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",#1
                                  Imagebase:0x430000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:21:00:03
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvc.exe
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:96236BE68E3F6B6711717EE2516BC8EF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1344941761.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1345317015.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1345317015.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 93%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:21:00:04
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:96236BE68E3F6B6711717EE2516BC8EF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1356426068.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2005636725.0000000001EDF000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2005894392.000000000240A000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1356558525.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1356558525.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:21:00:05
                                  Start date:14/01/2025
                                  Path:C:\Windows\tasksche.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                  Imagebase:0x400000
                                  File size:3'514'368 bytes
                                  MD5 hash:938C8405B0CCF0BA9635BB444CEC105D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1363779219.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 95%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:10
                                  Start time:21:00:06
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\xjljKPlxqO.dll",PlayGame
                                  Imagebase:0x430000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:21:00:06
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvc.exe
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:96236BE68E3F6B6711717EE2516BC8EF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1372763322.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1385236492.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1385379656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1372940689.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1372940689.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:12
                                  Start time:21:00:07
                                  Start date:14/01/2025
                                  Path:C:\Windows\tasksche.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                  Imagebase:0x400000
                                  File size:3'514'368 bytes
                                  MD5 hash:938C8405B0CCF0BA9635BB444CEC105D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1384126735.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1384725857.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:71.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:63.2%
                                    Total number of Nodes:38
                                    Total number of Limit Nodes:9
                                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                    • CreateProcessA.KERNELBASE ref: 00407EE8
                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1365141016.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.1365117555.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365158726.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365239005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4281112323-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1365141016.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.1365117555.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365158726.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365239005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1365141016.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.1365117555.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365158726.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365239005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    • API String ID: 774561529-2942426231
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1365141016.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.1365117555.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365158726.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365239005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                    • API String ID: 3340711343-4063779371
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1365141016.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.1365117555.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365158726.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365174937.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365239005.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.1365345381.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.0
                                    • API String ID: 4274534310-3729025388
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Execution Graph

                                    Execution Coverage:34.8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:36
                                    Total number of Limit Nodes:2

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2004035656.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2004022914.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004050173.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004115401.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004130647.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.0
                                    • API String ID: 4274534310-3729025388
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2004035656.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2004022914.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004050173.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004115401.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004130647.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    • API String ID: 774561529-2942426231
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2004035656.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2004022914.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004050173.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004115401.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004130647.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                    • API String ID: 3340711343-4063779371
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2004035656.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2004022914.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004050173.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004115401.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004130647.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4072214828-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2004035656.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2004022914.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004050173.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004064796.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004100533.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004115401.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004130647.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2004220870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                    APIs
                                    • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: /../$/..\$\../$\..\
                                    • API String ID: 3510742995-3885502717
                                    • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                    • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                    • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                    • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                    APIs
                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                    • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                    • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                    • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                    • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                    • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                    • API String ID: 2238633743-2459060434
                                    • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                    • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                    • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                    • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                    APIs
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                    • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$ManagerStart
                                    • String ID: cmd.exe /c "%s"
                                    • API String ID: 1485051382-955883872
                                    • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                    • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                    • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                    • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                    • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                    • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow$memcpy
                                    • String ID:
                                    • API String ID: 1881450474-3916222277
                                    • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                    • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                    • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                    • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                    • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                    • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                    • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                    • String ID: WANACRY!
                                    • API String ID: 283026544-1240840912
                                    • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                    • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                    • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                    • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID: $Q;@
                                    • API String ID: 2382887404-262343263
                                    • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                    • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                    • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                    • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID:
                                    • API String ID: 2382887404-3916222277
                                    • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                    • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                    • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                    • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                    APIs
                                    • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$FreeProcessfree
                                    • String ID:
                                    • API String ID: 3428986607-0
                                    • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                    • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                    • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                    • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow
                                    • String ID:
                                    • API String ID: 941485209-0
                                    • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                    • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                    • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                    • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow
                                    • String ID:
                                    • API String ID: 941485209-0
                                    • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                    • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                    • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                    • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                    • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                    • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                    • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                    APIs
                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ContextCryptRelease
                                    • String ID:
                                    • API String ID: 829835001-0
                                    • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                    • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                    • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                    • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                    • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                    • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                    • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                    • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                    • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                    • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                    APIs
                                      • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                    • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                    • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                    • API String ID: 2238633743-1294736154
                                    • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                    • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                    • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                    • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %s%s$%s%s%s$:$\
                                    • API String ID: 0-1100577047
                                    • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                    • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                    • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                    • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                    APIs
                                    • __p___argv.MSVCRT(0040F538), ref: 00402040
                                    • strcmp.MSVCRT(?), ref: 0040204B
                                    • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                    • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                      • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                    • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                    • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                    • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                      • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMulusermePathWideWindows__p___argvstrcmpswprintf
                                    • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                    • API String ID: 1074704982-2844324180
                                    • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                    • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                    • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                    • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                    APIs
                                    • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                    • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                    • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                    • strlen.MSVCRT(?), ref: 004011A7
                                    • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                    • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                    • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                    • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                    • String ID: 0@$Software\$WanaCrypt0r
                                    • API String ID: 865909632-3421300005
                                    • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                    • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                    • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                    • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                    • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                    • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                    • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                    • String ID: %s\Intel$%s\ProgramData
                                    • API String ID: 3806094219-198707228
                                    • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                    • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                    • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                    • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                    APIs
                                      • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                    • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                    • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                    • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                      • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                    • SetLastError.KERNEL32(0000045A), ref: 00402430
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                    • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                    • API String ID: 1900561814-3657104962
                                    • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                    • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                    • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                    • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                    APIs
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                    • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                    • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                    • String ID: %s\%s
                                    • API String ID: 1036847564-4073750446
                                    • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                    • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                    • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                    • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                    APIs
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                    • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                    • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                    • CloseHandle.KERNEL32(?), ref: 004010EC
                                    • CloseHandle.KERNEL32(?), ref: 004010F1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                    • String ID: D
                                    • API String ID: 786732093-2746444292
                                    • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                    • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                    • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                    • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                    APIs
                                    • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                    • __p__fmode.MSVCRT ref: 004077FC
                                    • __p__commode.MSVCRT ref: 0040780A
                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                    • String ID:
                                    • API String ID: 3626615345-0
                                    • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                    • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                    • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                    • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                    APIs
                                    • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                      • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                    • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                    • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                    • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                    • String ID:
                                    • API String ID: 2141228402-0
                                    • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                    • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                    • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                    • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                    APIs
                                    • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                    • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                    • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Read$realloc
                                    • String ID: ?!@
                                    • API String ID: 1241503663-708128716
                                    • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                    • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                    • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                    • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: rand$wcslen$ComputerNamesrand
                                    • String ID:
                                    • API String ID: 3058258771-0
                                    • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                    • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                    • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                    • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                    APIs
                                    • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                    • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                    • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                    • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                    • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                    • String ID:
                                    • API String ID: 2935503933-0
                                    • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                    • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                    • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                    • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                    APIs
                                    • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                    • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                    • Sleep.KERNEL32(000003E8), ref: 00401F40
                                    • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleMutexOpenSleepsprintf
                                    • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                    • API String ID: 2780352083-2959021817
                                    • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                    • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                    • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                    • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID:
                                    • API String ID: 2382887404-0
                                    • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                    • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                    • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                    • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                    APIs
                                    • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                    • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                    • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                    • fclose.MSVCRT(00000000), ref: 00401058
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: fclosefopenfreadfwrite
                                    • String ID: c.wnry
                                    • API String ID: 4000964834-3240288721
                                    • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                    • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                    • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                    • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                    • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                    • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                    • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                    • String ID:
                                    • API String ID: 2811923685-0
                                    • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                    • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                    • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                    • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                    APIs
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Pointer$??2@Create
                                    • String ID:
                                    • API String ID: 1331958074-0
                                    • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                    • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                    • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                    • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                    APIs
                                    • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                    • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_stricmp
                                    • String ID: P!@
                                    • API String ID: 1278613211-1774101457
                                    • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                    • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                    • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                    • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                    APIs
                                    • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                    • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AttributesFilestrcmp
                                    • String ID: c.wnry
                                    • API String ID: 3324900478-3240288721
                                    • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                    • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                    • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                    • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                    APIs
                                    • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??3@CloseHandle
                                    • String ID: $l@
                                    • API String ID: 3816424416-2140230165
                                    • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                    • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                    • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                    • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                    • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.1364528363.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000009.00000002.1364495389.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364562374.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364601300.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000009.00000002.1364638873.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Entermemcpy
                                    • String ID:
                                    • API String ID: 3435569088-0
                                    • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                    • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                    • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                    • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65