Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
S8LDvVdtOk.dll

Overview

General Information

Sample name:S8LDvVdtOk.dll
renamed because original name is a hash value
Original sample name:cfc424c730afcd48b93cbd3afddc16fc.dll
Analysis ID:1591536
MD5:cfc424c730afcd48b93cbd3afddc16fc
SHA1:66b680cdcc9ce5189a6924411a7fe997bddd9263
SHA256:c0af5be3062f93921ab7dfa8544c5b4b35c65cfbe56b0e1fb2234db8d1446a69
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6592 cmdline: loaddll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4816 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 2260 cmdline: rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3732 cmdline: rundll32.exe C:\Users\user\Desktop\S8LDvVdtOk.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 4144 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 04E178C7502AD997C41E30001CDED555)
        • tasksche.exe (PID: 6376 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
    • rundll32.exe (PID: 796 cmdline: rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 5012 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 04E178C7502AD997C41E30001CDED555)
        • tasksche.exe (PID: 6452 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
  • mssecsvc.exe (PID: 6044 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 04E178C7502AD997C41E30001CDED555)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
S8LDvVdtOk.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    S8LDvVdtOk.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    S8LDvVdtOk.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      0000000A.00000000.1741504305.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000007.00000000.1716088204.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        0000000A.00000002.1741829358.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        Click to see the 24 entries
        SourceRuleDescriptionAuthorStrings
        6.2.mssecsvc.exe.21948c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
        • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
        • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
        • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
        6.2.mssecsvc.exe.21948c8.9.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
        • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
        • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
        • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
        6.2.mssecsvc.exe.1c71084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
        • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
        • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
        • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
        6.2.mssecsvc.exe.1c71084.4.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
        • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
        • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
        • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
        6.2.mssecsvc.exe.21c696c.6.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          Click to see the 138 entries
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: S8LDvVdtOk.dllAvira: detected
          Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
          Source: C:\WINDOWS\qeriuwjhrf (copy)Virustotal: Detection: 90%Perma Link
          Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
          Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
          Source: C:\Windows\tasksche.exeVirustotal: Detection: 90%Perma Link
          Source: S8LDvVdtOk.dllVirustotal: Detection: 88%Perma Link
          Source: S8LDvVdtOk.dllReversingLabs: Detection: 94%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.2% probability
          Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
          Source: S8LDvVdtOk.dllJoe Sandbox ML: detected
          Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

          Exploits

          barindex
          Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
          Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
          Source: S8LDvVdtOk.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.23
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.23
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.23
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.23
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 141.211.41.1
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.169
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.169
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.169
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.169
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 133.36.248.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.44
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.44
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.44
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.44
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 74.63.206.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.78
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.78
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.78
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.78
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 196.102.75.1
          Source: unknownTCP traffic detected without corresponding DNS query: 135.122.86.233
          Source: unknownTCP traffic detected without corresponding DNS query: 135.122.86.233
          Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

          Spam, unwanted Advertisements and Ransom Demands

          barindex
          Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
          Source: Yara matchFile source: S8LDvVdtOk.dll, type: SAMPLE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.1c80104.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.21a3948.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.1c7c0a4.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.mssecsvc.exe.219f8e8.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.1711655667.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1742157775.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.1713770716.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.1739678024.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1742273790.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.1739786619.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.1711889679.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2351187529.0000000001C80000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.1713913498.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2351455320.00000000021A3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4144, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6044, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5012, type: MEMORYSTR
          Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

          System Summary

          barindex
          Source: S8LDvVdtOk.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: S8LDvVdtOk.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.21948c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.21948c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.1c71084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1c71084.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.1c80104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1c80104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 6.2.mssecsvc.exe.21a3948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.21a3948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.1c7c0a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.1c7c0a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 6.2.mssecsvc.exe.219f8e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 6.2.mssecsvc.exe.219f8e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 0000000A.00000000.1741504305.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000007.00000000.1716088204.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 0000000A.00000002.1741829358.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000009.00000002.1742273790.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000009.00000000.1739786619.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000005.00000000.1711889679.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000006.00000002.2351187529.0000000001C80000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000006.00000000.1713913498.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000006.00000002.2351455320.00000000021A3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
          Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
          Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
          Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
          Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
          Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
          Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
          Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
          Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
          Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
          Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
          Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
          Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
          Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
          Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
          Source: S8LDvVdtOk.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
          Source: S8LDvVdtOk.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: S8LDvVdtOk.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.21948c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.21948c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.1c71084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1c71084.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.21c696c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.21c696c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.1ca3128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.1c71084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 6.2.mssecsvc.exe.21948c8.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.1ca3128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 6.2.mssecsvc.exe.1c80104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.1c80104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1c80104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 6.2.mssecsvc.exe.21a3948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.21a3948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 6.2.mssecsvc.exe.21a3948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.1c7c0a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.1c7c0a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 6.2.mssecsvc.exe.219f8e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 6.2.mssecsvc.exe.219f8e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 0000000A.00000000.1741504305.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000007.00000000.1716088204.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 0000000A.00000002.1741829358.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000009.00000002.1742273790.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000009.00000000.1739786619.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000005.00000000.1711889679.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000006.00000002.2351187529.0000000001C80000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000006.00000000.1713913498.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000006.00000002.2351455320.00000000021A3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: tasksche.exe, 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000000.1741504305.000000000040E000.00000008.00000001.01000000.00000007.sdmp, S8LDvVdtOk.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
          Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@0/100
          Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
          Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
          Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
          Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
          Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
          Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
          Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6640:120:WilError_03
          Source: S8LDvVdtOk.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\S8LDvVdtOk.dll,PlayGame
          Source: S8LDvVdtOk.dllVirustotal: Detection: 88%
          Source: S8LDvVdtOk.dllReversingLabs: Detection: 94%
          Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll"
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\S8LDvVdtOk.dll,PlayGame
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
          Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
          Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",PlayGame
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
          Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\S8LDvVdtOk.dll,PlayGameJump to behavior
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",PlayGameJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
          Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
          Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: S8LDvVdtOk.dllStatic file information: File size 5267459 > 1048576
          Source: S8LDvVdtOk.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
          Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
          Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
          Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
          Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
          Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
          Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
          Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
          Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
          Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
          Source: C:\Windows\mssecsvc.exe TID: 1360Thread sleep count: 92 > 30Jump to behavior
          Source: C:\Windows\mssecsvc.exe TID: 1360Thread sleep time: -184000s >= -30000sJump to behavior
          Source: C:\Windows\mssecsvc.exe TID: 3320Thread sleep count: 129 > 30Jump to behavior
          Source: C:\Windows\mssecsvc.exe TID: 3320Thread sleep count: 39 > 30Jump to behavior
          Source: C:\Windows\mssecsvc.exe TID: 1360Thread sleep time: -86400000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
          Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
          Source: mssecsvc.exe, 00000005.00000002.1717421520.0000000000B8C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2350935155.0000000000E08000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1742736849.0000000000DDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
          Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1Jump to behavior
          Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Service Execution
          4
          Windows Service
          4
          Windows Service
          12
          Masquerading
          OS Credential Dumping1
          Network Share Discovery
          Remote Services1
          Archive Collected Data
          22
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          Data Encrypted for Impact
          CredentialsDomainsDefault Accounts1
          Native API
          1
          DLL Side-Loading
          11
          Process Injection
          21
          Virtualization/Sandbox Evasion
          LSASS Memory111
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          11
          Process Injection
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS2
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Rundll32
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1591536 Sample: S8LDvVdtOk.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 4 other signatures 2->54 8 loaddll32.exe 1 2->8         started        10 mssecsvc.exe 2->10         started        process3 dnsIp4 14 rundll32.exe 8->14         started        16 rundll32.exe 8->16         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        40 192.168.2.102 unknown unknown 10->40 42 192.168.2.103 unknown unknown 10->42 44 98 other IPs or domains 10->44 58 Connects to many different private IPs via SMB (likely to spread or exploit) 10->58 60 Connects to many different private IPs (likely to spread or exploit) 10->60 signatures5 process6 signatures7 23 mssecsvc.exe 1 14->23         started        46 Drops executables to the windows directory (C:\Windows) and starts them 16->46 26 mssecsvc.exe 1 16->26         started        29 rundll32.exe 1 19->29         started        process8 file9 36 C:\Windows\tasksche.exe, PE32 23->36 dropped 31 tasksche.exe 23->31         started        38 C:\WINDOWS\qeriuwjhrf (copy), PE32 26->38 dropped 56 Drops executables to the windows directory (C:\Windows) and starts them 26->56 34 tasksche.exe 26->34         started        signatures10 process11 signatures12 62 Detected Wannacry Ransomware 31->62 64 Antivirus detection for dropped file 31->64 66 Multi AV Scanner detection for dropped file 31->66 68 Machine Learning detection for dropped file 31->68

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          S8LDvVdtOk.dll89%VirustotalBrowse
          S8LDvVdtOk.dll95%ReversingLabsWin32.Ransomware.WannaCry
          S8LDvVdtOk.dll100%AviraTR/AD.WannaCry.sewvt
          S8LDvVdtOk.dll100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
          C:\Windows\tasksche.exe100%Joe Sandbox ML
          C:\WINDOWS\qeriuwjhrf (copy)90%VirustotalBrowse
          C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
          C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
          C:\Windows\tasksche.exe90%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          38.189.152.2
          unknownUnited States
          174COGENT-174USfalse
          38.189.152.1
          unknownUnited States
          174COGENT-174USfalse
          7.187.163.1
          unknownUnited States
          3356LEVEL3USfalse
          22.55.71.1
          unknownUnited States
          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
          220.187.236.1
          unknownChina
          4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
          221.147.121.78
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          135.122.86.233
          unknownUnited States
          18676AVAYAUSfalse
          210.93.150.1
          unknownKorea Republic of
          9842LDCC-ASLotteDataCommunicationCompanyKRfalse
          210.93.150.2
          unknownKorea Republic of
          9842LDCC-ASLotteDataCommunicationCompanyKRfalse
          61.93.241.88
          unknownHong Kong
          9269HKBN-AS-APHongKongBroadbandNetworkLtdHKfalse
          212.233.118.161
          unknownRussian Federation
          9110AGTELECOM-ASRUfalse
          31.43.128.160
          unknownUkraine
          48438CORBINA-ASUAfalse
          26.242.207.126
          unknownUnited States
          7922COMCAST-7922USfalse
          72.192.147.135
          unknownUnited States
          22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
          83.143.88.1
          unknownFinland
          34989SERVETHEWORLD-ASNOfalse
          212.233.118.1
          unknownRussian Federation
          9110AGTELECOM-ASRUfalse
          135.246.193.70
          unknownUnited States
          10455LUCENT-CIOUSfalse
          11.107.105.1
          unknownUnited States
          27651ENTELCHILESACLfalse
          74.63.206.44
          unknownUnited States
          46475LIMESTONENETWORKSUSfalse
          27.65.117.1
          unknownViet Nam
          7552VIETEL-AS-APViettelGroupVNfalse
          27.65.117.2
          unknownViet Nam
          7552VIETEL-AS-APViettelGroupVNfalse
          IP
          192.168.2.148
          192.168.2.149
          192.168.2.146
          192.168.2.147
          192.168.2.140
          192.168.2.141
          192.168.2.144
          192.168.2.145
          192.168.2.142
          192.168.2.143
          192.168.2.159
          192.168.2.157
          192.168.2.158
          192.168.2.151
          192.168.2.152
          192.168.2.150
          192.168.2.155
          192.168.2.156
          192.168.2.153
          192.168.2.154
          192.168.2.126
          192.168.2.247
          192.168.2.127
          192.168.2.248
          192.168.2.124
          192.168.2.245
          192.168.2.125
          192.168.2.246
          192.168.2.128
          192.168.2.249
          192.168.2.129
          192.168.2.240
          192.168.2.122
          192.168.2.243
          192.168.2.123
          192.168.2.244
          192.168.2.120
          192.168.2.241
          192.168.2.121
          192.168.2.242
          192.168.2.97
          192.168.2.137
          192.168.2.96
          192.168.2.138
          192.168.2.99
          192.168.2.135
          192.168.2.98
          192.168.2.136
          192.168.2.139
          192.168.2.250
          192.168.2.130
          192.168.2.251
          192.168.2.91
          192.168.2.90
          192.168.2.93
          192.168.2.133
          192.168.2.254
          192.168.2.92
          192.168.2.134
          192.168.2.95
          192.168.2.131
          192.168.2.252
          192.168.2.94
          192.168.2.132
          192.168.2.253
          192.168.2.104
          192.168.2.225
          192.168.2.105
          192.168.2.226
          192.168.2.102
          192.168.2.223
          192.168.2.103
          192.168.2.224
          192.168.2.108
          192.168.2.229
          192.168.2.109
          192.168.2.106
          192.168.2.227
          192.168.2.107
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1591536
          Start date and time:2025-01-15 03:01:32 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 37s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:S8LDvVdtOk.dll
          renamed because original name is a hash value
          Original Sample Name:cfc424c730afcd48b93cbd3afddc16fc.dll
          Detection:MAL
          Classification:mal100.rans.expl.evad.winDLL@20/2@0/100
          EGA Information:
          • Successful, ratio: 66.7%
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .dll
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 84.201.210.39, 2.23.77.188, 20.12.23.50, 4.245.163.56, 13.107.246.45
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target tasksche.exe, PID 6376 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          21:02:30API Interceptor1x Sleep call for process: loaddll32.exe modified
          21:03:02API Interceptor112x Sleep call for process: mssecsvc.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          MICROSOFT-CORP-MSN-AS-BLOCKUS542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
          • 20.15.180.0
          tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
          • 21.90.103.237
          330tqxXVzm.dllGet hashmaliciousWannacryBrowse
          • 40.90.175.1
          EXTERNAL Your company's credit limit has changed!.msgGet hashmaliciousUnknownBrowse
          • 13.89.179.14
          Eastern Contractors Corporation Contract and submittal document.emlGet hashmaliciousUnknownBrowse
          • 40.126.32.138
          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
          • 22.174.74.1
          bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
          • 20.51.106.1
          habHh1BC0L.dllGet hashmaliciousWannacryBrowse
          • 52.178.54.35
          https://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
          • 20.49.104.18
          FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
          • 22.184.197.1
          LEVEL3USGUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
          • 4.244.95.82
          330tqxXVzm.dllGet hashmaliciousWannacryBrowse
          • 9.126.239.1
          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
          • 7.123.157.99
          habHh1BC0L.dllGet hashmaliciousWannacryBrowse
          • 4.3.90.171
          hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
          • 6.45.217.1
          FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
          • 6.20.56.1
          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
          • 7.224.74.1
          mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
          • 7.204.138.1
          jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
          • 4.163.94.1
          6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
          • 4.143.32.1
          COGENT-174USxjljKPlxqO.dllGet hashmaliciousWannacryBrowse
          • 206.238.32.1
          http://iuyhrgjyujliyhgdhtyhuggdchrtgfdhfhtjh.b-cdn.net/Get hashmaliciousUnknownBrowse
          • 143.244.60.193
          v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
          • 38.1.235.120
          mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
          • 38.251.3.58
          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
          • 38.4.250.205
          meth8.elfGet hashmaliciousMiraiBrowse
          • 38.162.241.67
          meth1.elfGet hashmaliciousMiraiBrowse
          • 38.177.19.121
          arm4.elfGet hashmaliciousUnknownBrowse
          • 154.18.45.127
          ppc.elfGet hashmaliciousUnknownBrowse
          • 38.253.160.113
          spc.elfGet hashmaliciousUnknownBrowse
          • 149.51.229.75
          COGENT-174USxjljKPlxqO.dllGet hashmaliciousWannacryBrowse
          • 206.238.32.1
          http://iuyhrgjyujliyhgdhtyhuggdchrtgfdhfhtjh.b-cdn.net/Get hashmaliciousUnknownBrowse
          • 143.244.60.193
          v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
          • 38.1.235.120
          mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
          • 38.251.3.58
          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
          • 38.4.250.205
          meth8.elfGet hashmaliciousMiraiBrowse
          • 38.162.241.67
          meth1.elfGet hashmaliciousMiraiBrowse
          • 38.177.19.121
          arm4.elfGet hashmaliciousUnknownBrowse
          • 154.18.45.127
          ppc.elfGet hashmaliciousUnknownBrowse
          • 38.253.160.113
          spc.elfGet hashmaliciousUnknownBrowse
          • 149.51.229.75
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\WINDOWS\qeriuwjhrf (copy)9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
            zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
              zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                qt680eucI4.dllGet hashmaliciousWannacryBrowse
                  1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                    qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                      stN592INV6.exeGet hashmaliciousWannacryBrowse
                        onq54JS79W.exeGet hashmaliciousWannacryBrowse
                          mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                            MSNRf9dZ63.exeGet hashmaliciousWannacryBrowse
                              C:\Windows\tasksche.exe9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                  zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                                    qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                      1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                        qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                          stN592INV6.exeGet hashmaliciousWannacryBrowse
                                            onq54JS79W.exeGet hashmaliciousWannacryBrowse
                                              mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                                                MSNRf9dZ63.exeGet hashmaliciousWannacryBrowse
                                                  Process:C:\Windows\mssecsvc.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):3514368
                                                  Entropy (8bit):7.996072890929898
                                                  Encrypted:true
                                                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                  MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                  SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                  SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                  SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Virustotal, Detection: 90%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 100%
                                                  Joe Sandbox View:
                                                  • Filename: 9nNO3SHiV1.dll, Detection: malicious, Browse
                                                  • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                  • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                  • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                  • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                  • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                  • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                  • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                  • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                                  • Filename: MSNRf9dZ63.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\mssecsvc.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):3514368
                                                  Entropy (8bit):7.996072890929898
                                                  Encrypted:true
                                                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                  MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                  SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                  SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                  SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 100%
                                                  • Antivirus: Virustotal, Detection: 90%, Browse
                                                  Joe Sandbox View:
                                                  • Filename: 9nNO3SHiV1.dll, Detection: malicious, Browse
                                                  • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                  • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                  • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                  • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                  • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                  • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                  • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                  • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                                  • Filename: MSNRf9dZ63.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):6.412558858619418
                                                  TrID:
                                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                                  • DOS Executable Generic (2002/1) 0.20%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:S8LDvVdtOk.dll
                                                  File size:5'267'459 bytes
                                                  MD5:cfc424c730afcd48b93cbd3afddc16fc
                                                  SHA1:66b680cdcc9ce5189a6924411a7fe997bddd9263
                                                  SHA256:c0af5be3062f93921ab7dfa8544c5b4b35c65cfbe56b0e1fb2234db8d1446a69
                                                  SHA512:2063913f92bb3264dbc2d0a29625efaad098eef67b4ab1a1cfb2038cfc34510fc4cc8167c955cd79aac724e7c5be13f74321536439302242d838934a21d22d95
                                                  SSDEEP:98304:v8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:v8qPe1Cxcxk3ZAEUadzR8yc4H
                                                  TLSH:20363394622CB2FCF0440EB44463896BB7B33C6967BA5E1F9BC086670D43B5BAFD0641
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                  Icon Hash:7ae282899bbab082
                                                  Entrypoint:0x100011e9
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x10000000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                  DLL Characteristics:
                                                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  push ebx
                                                  mov ebx, dword ptr [ebp+08h]
                                                  push esi
                                                  mov esi, dword ptr [ebp+0Ch]
                                                  push edi
                                                  mov edi, dword ptr [ebp+10h]
                                                  test esi, esi
                                                  jne 00007FA29867ABCBh
                                                  cmp dword ptr [10003140h], 00000000h
                                                  jmp 00007FA29867ABE8h
                                                  cmp esi, 01h
                                                  je 00007FA29867ABC7h
                                                  cmp esi, 02h
                                                  jne 00007FA29867ABE4h
                                                  mov eax, dword ptr [10003150h]
                                                  test eax, eax
                                                  je 00007FA29867ABCBh
                                                  push edi
                                                  push esi
                                                  push ebx
                                                  call eax
                                                  test eax, eax
                                                  je 00007FA29867ABCEh
                                                  push edi
                                                  push esi
                                                  push ebx
                                                  call 00007FA29867AADAh
                                                  test eax, eax
                                                  jne 00007FA29867ABC6h
                                                  xor eax, eax
                                                  jmp 00007FA29867AC10h
                                                  push edi
                                                  push esi
                                                  push ebx
                                                  call 00007FA29867A98Ch
                                                  cmp esi, 01h
                                                  mov dword ptr [ebp+0Ch], eax
                                                  jne 00007FA29867ABCEh
                                                  test eax, eax
                                                  jne 00007FA29867ABF9h
                                                  push edi
                                                  push eax
                                                  push ebx
                                                  call 00007FA29867AAB6h
                                                  test esi, esi
                                                  je 00007FA29867ABC7h
                                                  cmp esi, 03h
                                                  jne 00007FA29867ABE8h
                                                  push edi
                                                  push esi
                                                  push ebx
                                                  call 00007FA29867AAA5h
                                                  test eax, eax
                                                  jne 00007FA29867ABC5h
                                                  and dword ptr [ebp+0Ch], eax
                                                  cmp dword ptr [ebp+0Ch], 00000000h
                                                  je 00007FA29867ABD3h
                                                  mov eax, dword ptr [10003150h]
                                                  test eax, eax
                                                  je 00007FA29867ABCAh
                                                  push edi
                                                  push esi
                                                  push ebx
                                                  call eax
                                                  mov dword ptr [ebp+0Ch], eax
                                                  mov eax, dword ptr [ebp+0Ch]
                                                  pop edi
                                                  pop esi
                                                  pop ebx
                                                  pop ebp
                                                  retn 000Ch
                                                  jmp dword ptr [10002028h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  Programming Language:
                                                  • [ C ] VS98 (6.0) build 8168
                                                  • [C++] VS98 (6.0) build 8168
                                                  • [RES] VS98 (6.0) cvtres build 1720
                                                  • [LNK] VS98 (6.0) imp/exp build 8168
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x40000x5000600x501000ab8b870f7e8abc98738a84eb89136049unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  W0x40600x500000dataEnglishUnited States0.8770370483398438
                                                  DLLImport
                                                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                  NameOrdinalAddress
                                                  PlayGame10x10001114
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 15, 2025 03:02:28.803746939 CET49730445192.168.2.4141.211.41.23
                                                  Jan 15, 2025 03:02:28.812561989 CET44549730141.211.41.23192.168.2.4
                                                  Jan 15, 2025 03:02:28.812689066 CET49730445192.168.2.4141.211.41.23
                                                  Jan 15, 2025 03:02:28.812724113 CET49730445192.168.2.4141.211.41.23
                                                  Jan 15, 2025 03:02:28.812967062 CET49731445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.817707062 CET44549730141.211.41.23192.168.2.4
                                                  Jan 15, 2025 03:02:28.817806959 CET49730445192.168.2.4141.211.41.23
                                                  Jan 15, 2025 03:02:28.817869902 CET44549731141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:28.817950010 CET49731445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.818962097 CET49731445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.820446968 CET49732445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.823833942 CET44549731141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:28.823894978 CET49731445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.825241089 CET44549732141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:28.825318098 CET49732445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.825371981 CET49732445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:28.830183029 CET44549732141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:29.157973051 CET49675443192.168.2.4173.222.162.32
                                                  Jan 15, 2025 03:02:30.800560951 CET49755445192.168.2.4210.93.150.206
                                                  Jan 15, 2025 03:02:30.805515051 CET44549755210.93.150.206192.168.2.4
                                                  Jan 15, 2025 03:02:30.805600882 CET49755445192.168.2.4210.93.150.206
                                                  Jan 15, 2025 03:02:30.805644035 CET49755445192.168.2.4210.93.150.206
                                                  Jan 15, 2025 03:02:30.805908918 CET49756445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.810626030 CET44549755210.93.150.206192.168.2.4
                                                  Jan 15, 2025 03:02:30.810662985 CET44549756210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:30.810702085 CET49755445192.168.2.4210.93.150.206
                                                  Jan 15, 2025 03:02:30.810754061 CET49756445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.810874939 CET49756445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.812206030 CET49757445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.815710068 CET44549756210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:30.815787077 CET49756445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.817118883 CET44549757210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:30.817198038 CET49757445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.817272902 CET49757445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:30.822014093 CET44549757210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:32.880067110 CET49779445192.168.2.4133.36.248.169
                                                  Jan 15, 2025 03:02:32.885785103 CET44549779133.36.248.169192.168.2.4
                                                  Jan 15, 2025 03:02:32.885871887 CET49779445192.168.2.4133.36.248.169
                                                  Jan 15, 2025 03:02:32.885943890 CET49779445192.168.2.4133.36.248.169
                                                  Jan 15, 2025 03:02:32.886260986 CET49781445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.891778946 CET44549781133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:32.891799927 CET44549779133.36.248.169192.168.2.4
                                                  Jan 15, 2025 03:02:32.891870975 CET49781445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.891920090 CET49779445192.168.2.4133.36.248.169
                                                  Jan 15, 2025 03:02:32.892143965 CET49781445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.897711039 CET44549781133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:32.897779942 CET49781445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.903383970 CET49782445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.909415960 CET44549782133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:32.909502029 CET49782445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.912130117 CET49782445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:32.917196989 CET44549782133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:34.832323074 CET49801445192.168.2.474.63.206.44
                                                  Jan 15, 2025 03:02:34.837198973 CET4454980174.63.206.44192.168.2.4
                                                  Jan 15, 2025 03:02:34.837315083 CET49801445192.168.2.474.63.206.44
                                                  Jan 15, 2025 03:02:34.837483883 CET49801445192.168.2.474.63.206.44
                                                  Jan 15, 2025 03:02:34.837754011 CET49802445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.842534065 CET4454980174.63.206.44192.168.2.4
                                                  Jan 15, 2025 03:02:34.842624903 CET49801445192.168.2.474.63.206.44
                                                  Jan 15, 2025 03:02:34.842665911 CET4454980274.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:34.842734098 CET49802445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.842849016 CET49802445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.844430923 CET49803445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.848304987 CET4454980274.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:34.848376036 CET49802445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.849766016 CET4454980374.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:34.849842072 CET49803445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.849932909 CET49803445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:34.854832888 CET4454980374.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.418546915 CET4454980374.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.418708086 CET49803445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:36.418837070 CET49803445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:36.418962955 CET49803445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:36.423603058 CET4454980374.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.423718929 CET4454980374.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.880311012 CET49824445192.168.2.4196.102.75.78
                                                  Jan 15, 2025 03:02:36.885293007 CET44549824196.102.75.78192.168.2.4
                                                  Jan 15, 2025 03:02:36.885381937 CET49824445192.168.2.4196.102.75.78
                                                  Jan 15, 2025 03:02:36.885432959 CET49824445192.168.2.4196.102.75.78
                                                  Jan 15, 2025 03:02:36.885696888 CET49826445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.891067982 CET44549824196.102.75.78192.168.2.4
                                                  Jan 15, 2025 03:02:36.891246080 CET44549826196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.891252041 CET49824445192.168.2.4196.102.75.78
                                                  Jan 15, 2025 03:02:36.891325951 CET49826445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.891407967 CET49826445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.892683983 CET49827445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.896255016 CET44549826196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.896330118 CET49826445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.897433996 CET44549827196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:36.897511959 CET49827445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.897572041 CET49827445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:36.902324915 CET44549827196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:38.879070044 CET49849445192.168.2.4135.122.86.233
                                                  Jan 15, 2025 03:02:38.883934975 CET44549849135.122.86.233192.168.2.4
                                                  Jan 15, 2025 03:02:38.884066105 CET49849445192.168.2.4135.122.86.233
                                                  Jan 15, 2025 03:02:38.884165049 CET49849445192.168.2.4135.122.86.233
                                                  Jan 15, 2025 03:02:38.884514093 CET49850445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.889113903 CET44549849135.122.86.233192.168.2.4
                                                  Jan 15, 2025 03:02:38.889189959 CET49849445192.168.2.4135.122.86.233
                                                  Jan 15, 2025 03:02:38.889266968 CET44549850135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:02:38.889322996 CET49850445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.889364004 CET49850445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.890513897 CET49851445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.894260883 CET44549850135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:02:38.894315958 CET49850445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.895330906 CET44549851135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:02:38.895387888 CET49851445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.895456076 CET49851445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:02:38.900262117 CET44549851135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:02:39.423974037 CET49860445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:39.428833961 CET4454986074.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:39.428934097 CET49860445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:39.428983927 CET49860445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:39.433737040 CET4454986074.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:40.892997980 CET49874445192.168.2.449.93.161.239
                                                  Jan 15, 2025 03:02:40.898961067 CET4454987449.93.161.239192.168.2.4
                                                  Jan 15, 2025 03:02:40.899050951 CET49874445192.168.2.449.93.161.239
                                                  Jan 15, 2025 03:02:40.899235010 CET49874445192.168.2.449.93.161.239
                                                  Jan 15, 2025 03:02:40.899636984 CET49875445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.904381037 CET4454987449.93.161.239192.168.2.4
                                                  Jan 15, 2025 03:02:40.904429913 CET49874445192.168.2.449.93.161.239
                                                  Jan 15, 2025 03:02:40.906840086 CET4454987549.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:02:40.906903028 CET49875445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.906940937 CET49875445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.907351017 CET49876445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.911834002 CET4454987549.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:02:40.911885977 CET49875445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.914838076 CET4454987649.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:02:40.914901972 CET49876445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.914947987 CET49876445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:02:40.922527075 CET4454987649.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:02:41.010854959 CET4454986074.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:41.010910988 CET49860445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:41.011077881 CET49860445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:41.011149883 CET49860445192.168.2.474.63.206.1
                                                  Jan 15, 2025 03:02:41.015994072 CET4454986074.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:41.016017914 CET4454986074.63.206.1192.168.2.4
                                                  Jan 15, 2025 03:02:41.064733982 CET49880445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.069632053 CET4454988074.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:02:41.069694996 CET49880445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.069760084 CET49880445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.070157051 CET49881445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.074749947 CET4454988074.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:02:41.074827909 CET49880445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.075406075 CET4454988174.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:02:41.075465918 CET49881445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.075506926 CET49881445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:02:41.080292940 CET4454988174.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:02:42.908864975 CET49903445192.168.2.438.189.152.235
                                                  Jan 15, 2025 03:02:42.913696051 CET4454990338.189.152.235192.168.2.4
                                                  Jan 15, 2025 03:02:42.913852930 CET49903445192.168.2.438.189.152.235
                                                  Jan 15, 2025 03:02:42.913882971 CET49903445192.168.2.438.189.152.235
                                                  Jan 15, 2025 03:02:42.914074898 CET49904445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.918975115 CET4454990338.189.152.235192.168.2.4
                                                  Jan 15, 2025 03:02:42.918986082 CET4454990438.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:02:42.919037104 CET49903445192.168.2.438.189.152.235
                                                  Jan 15, 2025 03:02:42.919070959 CET49904445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.919187069 CET49904445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.919506073 CET49905445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.924036980 CET4454990438.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:02:42.924125910 CET49904445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.924205065 CET4454990538.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:02:42.924341917 CET49905445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.924393892 CET49905445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:02:42.929115057 CET4454990538.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:02:44.924401045 CET49930445192.168.2.427.65.117.201
                                                  Jan 15, 2025 03:02:44.929418087 CET4454993027.65.117.201192.168.2.4
                                                  Jan 15, 2025 03:02:44.929537058 CET49930445192.168.2.427.65.117.201
                                                  Jan 15, 2025 03:02:44.929563046 CET49930445192.168.2.427.65.117.201
                                                  Jan 15, 2025 03:02:44.929702997 CET49931445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.934608936 CET4454993027.65.117.201192.168.2.4
                                                  Jan 15, 2025 03:02:44.934624910 CET4454993127.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:02:44.934731960 CET49930445192.168.2.427.65.117.201
                                                  Jan 15, 2025 03:02:44.934787035 CET49931445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.934859991 CET49931445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.935148001 CET49932445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.939845085 CET4454993127.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:02:44.939901114 CET49931445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.939973116 CET4454993227.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:02:44.940090895 CET49932445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.940128088 CET49932445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:02:44.944912910 CET4454993227.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:02:45.835076094 CET4972380192.168.2.4199.232.210.172
                                                  Jan 15, 2025 03:02:45.840354919 CET8049723199.232.210.172192.168.2.4
                                                  Jan 15, 2025 03:02:45.840424061 CET4972380192.168.2.4199.232.210.172
                                                  Jan 15, 2025 03:02:46.939855099 CET49956445192.168.2.4106.81.11.96
                                                  Jan 15, 2025 03:02:46.944750071 CET44549956106.81.11.96192.168.2.4
                                                  Jan 15, 2025 03:02:46.944823980 CET49956445192.168.2.4106.81.11.96
                                                  Jan 15, 2025 03:02:46.944871902 CET49956445192.168.2.4106.81.11.96
                                                  Jan 15, 2025 03:02:46.945099115 CET49957445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:02:46.949980021 CET44549957106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:02:46.949996948 CET44549956106.81.11.96192.168.2.4
                                                  Jan 15, 2025 03:02:46.950088978 CET49956445192.168.2.4106.81.11.96
                                                  Jan 15, 2025 03:02:46.950458050 CET49957445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:02:46.950458050 CET49958445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:02:46.955355883 CET44549958106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:02:46.955420971 CET44549957106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:02:46.955425978 CET49958445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:02:46.955471039 CET49957445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:02:46.955513000 CET49958445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:02:46.960231066 CET44549958106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:02:48.955405951 CET49981445192.168.2.460.1.132.250
                                                  Jan 15, 2025 03:02:48.960274935 CET4454998160.1.132.250192.168.2.4
                                                  Jan 15, 2025 03:02:48.960347891 CET49981445192.168.2.460.1.132.250
                                                  Jan 15, 2025 03:02:48.960401058 CET49981445192.168.2.460.1.132.250
                                                  Jan 15, 2025 03:02:48.960594893 CET49982445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.965331078 CET4454998160.1.132.250192.168.2.4
                                                  Jan 15, 2025 03:02:48.965363026 CET4454998260.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:02:48.965421915 CET49981445192.168.2.460.1.132.250
                                                  Jan 15, 2025 03:02:48.965457916 CET49982445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.965548992 CET49982445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.965837955 CET49983445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.970362902 CET4454998260.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:02:48.970696926 CET4454998360.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:02:48.970762968 CET49982445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.970809937 CET49983445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.970839977 CET49983445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:02:48.975620031 CET4454998360.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:02:50.199461937 CET44549732141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:50.199587107 CET49732445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:50.199673891 CET49732445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:50.199755907 CET49732445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:50.204463005 CET44549732141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:50.204509974 CET44549732141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:50.986573935 CET50005445192.168.2.460.96.7.249
                                                  Jan 15, 2025 03:02:50.991491079 CET4455000560.96.7.249192.168.2.4
                                                  Jan 15, 2025 03:02:50.991568089 CET50005445192.168.2.460.96.7.249
                                                  Jan 15, 2025 03:02:50.991602898 CET50005445192.168.2.460.96.7.249
                                                  Jan 15, 2025 03:02:50.991786957 CET50007445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:50.996478081 CET4455000560.96.7.249192.168.2.4
                                                  Jan 15, 2025 03:02:50.996550083 CET4455000560.96.7.249192.168.2.4
                                                  Jan 15, 2025 03:02:50.996617079 CET4455000760.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:50.996656895 CET50005445192.168.2.460.96.7.249
                                                  Jan 15, 2025 03:02:50.996725082 CET50007445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:50.996786118 CET50007445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:50.997164011 CET50008445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:51.001622915 CET4455000760.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:51.001718044 CET50007445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:51.002244949 CET4455000860.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:51.002304077 CET50008445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:51.002342939 CET50008445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:51.007118940 CET4455000860.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.212034941 CET44549757210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.212096930 CET49757445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:52.212172985 CET49757445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:52.212253094 CET49757445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:52.216949940 CET44549757210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.217005014 CET44549757210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.901299000 CET4455000860.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.901441097 CET50008445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:52.901485920 CET50008445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:52.901535034 CET50008445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:52.906392097 CET4455000860.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.906404018 CET4455000860.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.986857891 CET50030445192.168.2.483.143.88.189
                                                  Jan 15, 2025 03:02:52.991722107 CET4455003083.143.88.189192.168.2.4
                                                  Jan 15, 2025 03:02:52.991854906 CET50030445192.168.2.483.143.88.189
                                                  Jan 15, 2025 03:02:52.991875887 CET50030445192.168.2.483.143.88.189
                                                  Jan 15, 2025 03:02:52.992007971 CET50031445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:02:52.998548985 CET4455003183.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:02:52.998562098 CET4455003083.143.88.189192.168.2.4
                                                  Jan 15, 2025 03:02:52.998687029 CET50030445192.168.2.483.143.88.189
                                                  Jan 15, 2025 03:02:52.998804092 CET50031445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:02:52.998804092 CET50031445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:02:52.999150038 CET50032445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:02:53.004785061 CET4455003283.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:02:53.004797935 CET4455003183.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:02:53.004900932 CET50031445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:02:53.004928112 CET50032445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:02:53.009679079 CET4455003283.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:02:53.205481052 CET50034445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:53.210582018 CET44550034141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:53.210710049 CET50034445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:53.210757971 CET50034445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:02:53.215677977 CET44550034141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:02:54.260659933 CET44549782133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:54.260777950 CET49782445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:54.260906935 CET49782445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:54.261013031 CET49782445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:54.265656948 CET44549782133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:54.265803099 CET44549782133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.002350092 CET50037445192.168.2.47.187.163.25
                                                  Jan 15, 2025 03:02:55.007340908 CET445500377.187.163.25192.168.2.4
                                                  Jan 15, 2025 03:02:55.007427931 CET50037445192.168.2.47.187.163.25
                                                  Jan 15, 2025 03:02:55.007467985 CET50037445192.168.2.47.187.163.25
                                                  Jan 15, 2025 03:02:55.007700920 CET50038445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.012406111 CET445500377.187.163.25192.168.2.4
                                                  Jan 15, 2025 03:02:55.012454033 CET50037445192.168.2.47.187.163.25
                                                  Jan 15, 2025 03:02:55.012536049 CET445500387.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.012598991 CET50038445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.012630939 CET50038445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.013058901 CET50039445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.017532110 CET445500387.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.017622948 CET50038445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.017796993 CET445500397.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.017862082 CET50039445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.017908096 CET50039445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:02:55.022659063 CET445500397.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.220921040 CET50040445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:55.228513956 CET44550040210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.228641033 CET50040445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:55.228671074 CET50040445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:02:55.235871077 CET44550040210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.908305883 CET50041445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:55.916618109 CET4455004160.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:55.916698933 CET50041445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:55.916758060 CET50041445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:55.923903942 CET4455004160.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.018158913 CET50042445192.168.2.4197.91.244.53
                                                  Jan 15, 2025 03:02:57.026005983 CET44550042197.91.244.53192.168.2.4
                                                  Jan 15, 2025 03:02:57.026087046 CET50042445192.168.2.4197.91.244.53
                                                  Jan 15, 2025 03:02:57.026138067 CET50042445192.168.2.4197.91.244.53
                                                  Jan 15, 2025 03:02:57.026345015 CET50043445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.034316063 CET44550043197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.034327030 CET44550042197.91.244.53192.168.2.4
                                                  Jan 15, 2025 03:02:57.034414053 CET50042445192.168.2.4197.91.244.53
                                                  Jan 15, 2025 03:02:57.034734011 CET50043445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.034734011 CET50043445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.035717964 CET50044445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.042996883 CET44550043197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.043066978 CET50043445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.044425011 CET44550044197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.044501066 CET50044445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.044527054 CET50044445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:57.052443981 CET44550044197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.268026114 CET50045445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:57.272984028 CET44550045133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.273097038 CET50045445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:57.273135900 CET50045445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:02:57.277894020 CET44550045133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.788397074 CET4455004160.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.788506985 CET50041445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:57.788615942 CET50041445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:57.788615942 CET50041445192.168.2.460.96.7.1
                                                  Jan 15, 2025 03:02:57.793517113 CET4455004160.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.793550968 CET4455004160.96.7.1192.168.2.4
                                                  Jan 15, 2025 03:02:57.845917940 CET50046445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.850780010 CET4455004660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:02:57.850953102 CET50046445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.851072073 CET50046445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.851514101 CET50047445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.855895996 CET4455004660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:02:57.856024027 CET50046445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.856297016 CET4455004760.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:02:57.856383085 CET50047445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.861741066 CET50047445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:57.866535902 CET4455004760.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:02:58.258548975 CET44549827196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:58.258735895 CET49827445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:58.258826971 CET49827445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:58.258925915 CET49827445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:02:58.263597965 CET44549827196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:58.263741970 CET44549827196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.033729076 CET50048445192.168.2.494.112.164.92
                                                  Jan 15, 2025 03:02:59.038710117 CET4455004894.112.164.92192.168.2.4
                                                  Jan 15, 2025 03:02:59.038811922 CET50048445192.168.2.494.112.164.92
                                                  Jan 15, 2025 03:02:59.038846016 CET50048445192.168.2.494.112.164.92
                                                  Jan 15, 2025 03:02:59.038996935 CET50049445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.043849945 CET4455004994.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.043865919 CET4455004894.112.164.92192.168.2.4
                                                  Jan 15, 2025 03:02:59.043937922 CET50048445192.168.2.494.112.164.92
                                                  Jan 15, 2025 03:02:59.044063091 CET50049445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.044063091 CET50049445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.044440031 CET50050445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.048965931 CET4455004994.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.049048901 CET50049445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.049273014 CET4455005094.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.049333096 CET50050445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.049388885 CET50050445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:02:59.054225922 CET4455005094.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.208391905 CET44550044197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.208475113 CET50044445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:59.216756105 CET50044445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:59.216804981 CET50044445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:02:59.221658945 CET44550044197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.221694946 CET44550044197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:02:59.797151089 CET4455004760.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:02:59.800012112 CET50047445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:59.800265074 CET50047445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:59.800314903 CET50047445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:02:59.805064917 CET4455004760.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:02:59.805095911 CET4455004760.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:03:00.262656927 CET44549851135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:00.262820005 CET49851445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:00.262928963 CET49851445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:00.263010979 CET49851445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:00.267684937 CET44549851135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:00.267760038 CET44549851135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:01.049411058 CET50051445192.168.2.461.93.241.88
                                                  Jan 15, 2025 03:03:01.054325104 CET4455005161.93.241.88192.168.2.4
                                                  Jan 15, 2025 03:03:01.054905891 CET50051445192.168.2.461.93.241.88
                                                  Jan 15, 2025 03:03:01.054941893 CET50051445192.168.2.461.93.241.88
                                                  Jan 15, 2025 03:03:01.055109024 CET50052445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.059887886 CET4455005261.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:01.059901953 CET4455005161.93.241.88192.168.2.4
                                                  Jan 15, 2025 03:03:01.059947014 CET50052445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.059972048 CET50051445192.168.2.461.93.241.88
                                                  Jan 15, 2025 03:03:01.060080051 CET50052445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.060386896 CET50053445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.064933062 CET4455005261.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:01.065218925 CET4455005361.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:01.065270901 CET50052445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.065308094 CET50053445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.065363884 CET50053445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:01.070152044 CET4455005361.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:01.268100023 CET50054445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:03:01.272927999 CET44550054196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:03:01.274930954 CET50054445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:03:01.275006056 CET50054445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:03:01.279792070 CET44550054196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:03:02.223519087 CET50055445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:03:02.228579044 CET44550055197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:03:02.228677988 CET50055445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:03:02.232228041 CET50055445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:03:02.237153053 CET44550055197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:03:02.295521021 CET4454987649.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:02.295702934 CET49876445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:02.297744989 CET49876445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:02.297794104 CET49876445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:02.302618027 CET4454987649.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:02.302629948 CET4454987649.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:02.449816942 CET4454988174.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:02.449877024 CET49881445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:02.449953079 CET49881445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:02.450006962 CET49881445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:02.454679012 CET4454988174.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:02.454734087 CET4454988174.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:02.814573050 CET50056445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:03:02.819480896 CET4455005660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:03:02.819581032 CET50056445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:03:02.819655895 CET50056445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:03:02.824419975 CET4455005660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:03:03.065453053 CET50057445192.168.2.472.192.147.135
                                                  Jan 15, 2025 03:03:03.070334911 CET4455005772.192.147.135192.168.2.4
                                                  Jan 15, 2025 03:03:03.070437908 CET50057445192.168.2.472.192.147.135
                                                  Jan 15, 2025 03:03:03.070564985 CET50057445192.168.2.472.192.147.135
                                                  Jan 15, 2025 03:03:03.070748091 CET50058445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.075417995 CET4455005772.192.147.135192.168.2.4
                                                  Jan 15, 2025 03:03:03.075474024 CET50057445192.168.2.472.192.147.135
                                                  Jan 15, 2025 03:03:03.075490952 CET4455005872.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:03.075548887 CET50058445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.076421976 CET50058445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.076836109 CET50059445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.081228971 CET4455005872.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:03.081286907 CET50058445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.081624985 CET4455005972.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:03.081784964 CET50059445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.081784964 CET50059445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:03.086530924 CET4455005972.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:03.267975092 CET50060445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:03.272819042 CET44550060135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:03.272964001 CET50060445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:03.272990942 CET50060445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:03.279761076 CET44550060135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.350085020 CET4454990538.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.350214005 CET49905445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:04.350259066 CET49905445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:04.350327969 CET49905445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:04.357101917 CET4454990538.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.357115984 CET4454990538.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.405505896 CET44550055197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.407001019 CET50055445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:03:04.407047987 CET50055445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:03:04.407068014 CET50055445192.168.2.4197.91.244.1
                                                  Jan 15, 2025 03:03:04.413805962 CET44550055197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.413813114 CET44550055197.91.244.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.470850945 CET50061445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.477607965 CET44550061197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.478945971 CET50061445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.479072094 CET50061445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.479459047 CET50062445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.485982895 CET44550061197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.486112118 CET44550062197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.486211061 CET50061445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.486238956 CET50062445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.486319065 CET50062445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:04.493033886 CET44550062197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.749388933 CET4455005660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.749461889 CET50056445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:03:04.749515057 CET50056445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:03:04.749624014 CET50056445192.168.2.460.96.7.2
                                                  Jan 15, 2025 03:03:04.754410028 CET4455005660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.754424095 CET4455005660.96.7.2192.168.2.4
                                                  Jan 15, 2025 03:03:04.832941055 CET50063445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.838910103 CET4455006360.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:04.839174032 CET50063445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.839174032 CET50063445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.839566946 CET50064445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.844116926 CET4455006360.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:04.844302893 CET50063445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.846915007 CET4455006460.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:04.847002029 CET50064445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.847023010 CET50064445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:04.853889942 CET4455006460.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:04.939981937 CET50065445192.168.2.455.61.232.12
                                                  Jan 15, 2025 03:03:04.945965052 CET4455006555.61.232.12192.168.2.4
                                                  Jan 15, 2025 03:03:04.946974039 CET50065445192.168.2.455.61.232.12
                                                  Jan 15, 2025 03:03:04.946996927 CET50065445192.168.2.455.61.232.12
                                                  Jan 15, 2025 03:03:04.947138071 CET50066445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.951927900 CET4455006655.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.954896927 CET4455006555.61.232.12192.168.2.4
                                                  Jan 15, 2025 03:03:04.954927921 CET50066445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.954967976 CET50065445192.168.2.455.61.232.12
                                                  Jan 15, 2025 03:03:04.955041885 CET50066445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.955406904 CET50067445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.959920883 CET4455006655.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.960004091 CET50066445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.962877989 CET4455006755.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:04.963001013 CET50067445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.963078022 CET50067445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:04.967890978 CET4455006755.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:05.299283981 CET50068445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:05.304250956 CET4455006849.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:05.304375887 CET50068445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:05.304469109 CET50068445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:05.309290886 CET4455006849.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:05.455305099 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:05.465056896 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:05.465219975 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:05.465261936 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:05.474104881 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:06.307499886 CET4454993227.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.307620049 CET49932445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:06.307689905 CET49932445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:06.307735920 CET49932445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:06.312613010 CET4454993227.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.312628031 CET4454993227.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.689923048 CET50070445192.168.2.4212.233.118.161
                                                  Jan 15, 2025 03:03:06.695849895 CET44550070212.233.118.161192.168.2.4
                                                  Jan 15, 2025 03:03:06.696047068 CET50070445192.168.2.4212.233.118.161
                                                  Jan 15, 2025 03:03:06.696111917 CET50070445192.168.2.4212.233.118.161
                                                  Jan 15, 2025 03:03:06.696285009 CET50071445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.702188969 CET44550070212.233.118.161192.168.2.4
                                                  Jan 15, 2025 03:03:06.702272892 CET50070445192.168.2.4212.233.118.161
                                                  Jan 15, 2025 03:03:06.702358961 CET44550071212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.702557087 CET50071445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.702688932 CET50071445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.703104973 CET50072445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.709559917 CET44550071212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.709639072 CET50071445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.709793091 CET44550072212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.709887028 CET50072445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.709975004 CET50072445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:06.715929031 CET44550072212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:06.744529963 CET4455006460.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:06.744642973 CET50064445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:06.744716883 CET50064445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:06.744740009 CET50064445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:06.750714064 CET4455006460.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:06.750731945 CET4455006460.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:07.361671925 CET50073445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:07.368221045 CET4455007338.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:07.368314981 CET50073445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:07.368360043 CET50073445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:07.374936104 CET4455007338.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.325078964 CET44549958106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.325139999 CET49958445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:08.325167894 CET49958445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:08.325212002 CET49958445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:08.330018997 CET44549958106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.330024958 CET44549958106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.330430031 CET50074445192.168.2.422.55.71.47
                                                  Jan 15, 2025 03:03:08.335952997 CET4455007422.55.71.47192.168.2.4
                                                  Jan 15, 2025 03:03:08.336023092 CET50074445192.168.2.422.55.71.47
                                                  Jan 15, 2025 03:03:08.336044073 CET50074445192.168.2.422.55.71.47
                                                  Jan 15, 2025 03:03:08.337358952 CET50075445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.342935085 CET4455007522.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.343087912 CET4455007422.55.71.47192.168.2.4
                                                  Jan 15, 2025 03:03:08.343362093 CET50076445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.343417883 CET50074445192.168.2.422.55.71.47
                                                  Jan 15, 2025 03:03:08.343539000 CET50075445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.343539953 CET50075445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.348273993 CET4455007622.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.348563910 CET4455007522.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:08.348659992 CET50076445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.348717928 CET50076445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.350440025 CET50075445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:08.353962898 CET4455007622.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:09.314605951 CET50077445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:09.323779106 CET4455007727.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:09.323894978 CET50077445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:09.323916912 CET50077445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:09.335150957 CET4455007727.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:09.752110958 CET50078445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:09.757013083 CET4455007860.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:09.757117033 CET50078445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:09.757147074 CET50078445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:09.761931896 CET4455007860.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:09.862142086 CET50079445192.168.2.4220.187.236.197
                                                  Jan 15, 2025 03:03:09.867222071 CET44550079220.187.236.197192.168.2.4
                                                  Jan 15, 2025 03:03:09.867371082 CET50079445192.168.2.4220.187.236.197
                                                  Jan 15, 2025 03:03:09.867619991 CET50079445192.168.2.4220.187.236.197
                                                  Jan 15, 2025 03:03:09.867753983 CET50080445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.872492075 CET44550079220.187.236.197192.168.2.4
                                                  Jan 15, 2025 03:03:09.872565985 CET44550080220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:09.872585058 CET50079445192.168.2.4220.187.236.197
                                                  Jan 15, 2025 03:03:09.872668028 CET50080445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.872786045 CET50080445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.873101950 CET50081445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.877804995 CET44550080220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:09.877856016 CET44550081220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:09.877882957 CET50080445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.877917051 CET50081445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.877964973 CET50081445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:09.882745981 CET44550081220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:10.340605974 CET4454998360.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:03:10.340725899 CET49983445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:10.340807915 CET49983445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:10.340876102 CET49983445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:10.345597982 CET4454998360.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:03:10.345629930 CET4454998360.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.288391113 CET50082445192.168.2.431.43.128.160
                                                  Jan 15, 2025 03:03:11.296103001 CET4455008231.43.128.160192.168.2.4
                                                  Jan 15, 2025 03:03:11.296262980 CET50082445192.168.2.431.43.128.160
                                                  Jan 15, 2025 03:03:11.296412945 CET50082445192.168.2.431.43.128.160
                                                  Jan 15, 2025 03:03:11.296700001 CET50083445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.304322958 CET4455008331.43.128.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.304339886 CET4455008231.43.128.160192.168.2.4
                                                  Jan 15, 2025 03:03:11.304507971 CET50082445192.168.2.431.43.128.160
                                                  Jan 15, 2025 03:03:11.304644108 CET50083445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.304644108 CET50083445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.305033922 CET50084445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.312489986 CET4455008331.43.128.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.312588930 CET4455008331.43.128.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.312660933 CET50083445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.313982010 CET4455008431.43.128.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.314071894 CET50084445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.314135075 CET50084445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:11.322084904 CET4455008431.43.128.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.330190897 CET50085445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:11.338205099 CET44550085106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.338334084 CET50085445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:11.338377953 CET50085445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:11.343579054 CET44550085106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:03:11.650861979 CET4455007860.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:11.650954962 CET50078445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:11.651031017 CET50078445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:11.651072979 CET50078445192.168.2.460.96.7.3
                                                  Jan 15, 2025 03:03:11.655786991 CET4455007860.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:11.655797958 CET4455007860.96.7.3192.168.2.4
                                                  Jan 15, 2025 03:03:11.718601942 CET50086445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.723603964 CET4455008660.96.7.4192.168.2.4
                                                  Jan 15, 2025 03:03:11.723680973 CET50086445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.723741055 CET50086445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.724114895 CET50087445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.728768110 CET4455008660.96.7.4192.168.2.4
                                                  Jan 15, 2025 03:03:11.728883982 CET50086445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.729386091 CET4455008760.96.7.4192.168.2.4
                                                  Jan 15, 2025 03:03:11.729477882 CET50087445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.729533911 CET50087445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:11.735073090 CET4455008760.96.7.4192.168.2.4
                                                  Jan 15, 2025 03:03:12.611840963 CET50088445192.168.2.450.231.69.134
                                                  Jan 15, 2025 03:03:12.616878033 CET4455008850.231.69.134192.168.2.4
                                                  Jan 15, 2025 03:03:12.617028952 CET50088445192.168.2.450.231.69.134
                                                  Jan 15, 2025 03:03:12.617028952 CET50088445192.168.2.450.231.69.134
                                                  Jan 15, 2025 03:03:12.617175102 CET50089445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.622183084 CET4455008950.231.69.1192.168.2.4
                                                  Jan 15, 2025 03:03:12.622224092 CET4455008850.231.69.134192.168.2.4
                                                  Jan 15, 2025 03:03:12.622293949 CET50089445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.622325897 CET50088445192.168.2.450.231.69.134
                                                  Jan 15, 2025 03:03:12.622399092 CET50089445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.622867107 CET50090445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.627388000 CET4455008950.231.69.1192.168.2.4
                                                  Jan 15, 2025 03:03:12.627484083 CET50089445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.627760887 CET4455009050.231.69.1192.168.2.4
                                                  Jan 15, 2025 03:03:12.627837896 CET50090445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.627877951 CET50090445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:12.632639885 CET4455009050.231.69.1192.168.2.4
                                                  Jan 15, 2025 03:03:13.345931053 CET50091445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:13.353224039 CET4455009160.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:03:13.353332996 CET50091445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:13.353358030 CET50091445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:13.360527039 CET4455009160.1.132.1192.168.2.4
                                                  Jan 15, 2025 03:03:13.906749964 CET50092445192.168.2.426.242.207.126
                                                  Jan 15, 2025 03:03:13.914376020 CET4455009226.242.207.126192.168.2.4
                                                  Jan 15, 2025 03:03:13.914484024 CET50092445192.168.2.426.242.207.126
                                                  Jan 15, 2025 03:03:13.914661884 CET50092445192.168.2.426.242.207.126
                                                  Jan 15, 2025 03:03:13.914953947 CET50093445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.922190905 CET4455009326.242.207.1192.168.2.4
                                                  Jan 15, 2025 03:03:13.922260046 CET50093445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.922388077 CET4455009226.242.207.126192.168.2.4
                                                  Jan 15, 2025 03:03:13.922444105 CET50092445192.168.2.426.242.207.126
                                                  Jan 15, 2025 03:03:13.922518969 CET50093445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.929785967 CET50094445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.929982901 CET4455009326.242.207.1192.168.2.4
                                                  Jan 15, 2025 03:03:13.930042982 CET50093445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.936074018 CET4455009426.242.207.1192.168.2.4
                                                  Jan 15, 2025 03:03:13.936156034 CET50094445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.936830997 CET50094445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:13.941653013 CET4455009426.242.207.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.368163109 CET4455003283.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.368242979 CET50032445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:14.368288040 CET50032445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:14.368333101 CET50032445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:14.373313904 CET4455003283.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.373330116 CET4455003283.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.623826981 CET44550034141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.623945951 CET50034445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:03:14.624037027 CET50034445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:03:14.624073982 CET50034445192.168.2.4141.211.41.1
                                                  Jan 15, 2025 03:03:14.629086971 CET44550034141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.629126072 CET44550034141.211.41.1192.168.2.4
                                                  Jan 15, 2025 03:03:14.689774990 CET50095445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.694844007 CET44550095141.211.41.2192.168.2.4
                                                  Jan 15, 2025 03:03:14.694940090 CET50095445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.694976091 CET50095445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.695333004 CET50096445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.700095892 CET44550095141.211.41.2192.168.2.4
                                                  Jan 15, 2025 03:03:14.700169086 CET50095445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.700226068 CET44550096141.211.41.2192.168.2.4
                                                  Jan 15, 2025 03:03:14.700515032 CET50096445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.700515032 CET50096445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:14.705388069 CET44550096141.211.41.2192.168.2.4
                                                  Jan 15, 2025 03:03:15.065316916 CET50097445192.168.2.411.107.105.212
                                                  Jan 15, 2025 03:03:15.073884964 CET4455009711.107.105.212192.168.2.4
                                                  Jan 15, 2025 03:03:15.074098110 CET50097445192.168.2.411.107.105.212
                                                  Jan 15, 2025 03:03:15.074157953 CET50097445192.168.2.411.107.105.212
                                                  Jan 15, 2025 03:03:15.074428082 CET50098445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.082582951 CET4455009711.107.105.212192.168.2.4
                                                  Jan 15, 2025 03:03:15.082719088 CET50097445192.168.2.411.107.105.212
                                                  Jan 15, 2025 03:03:15.082748890 CET4455009811.107.105.1192.168.2.4
                                                  Jan 15, 2025 03:03:15.082861900 CET50098445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.083035946 CET50098445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.083980083 CET50099445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.091207981 CET4455009811.107.105.1192.168.2.4
                                                  Jan 15, 2025 03:03:15.091291904 CET50098445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.092221022 CET4455009911.107.105.1192.168.2.4
                                                  Jan 15, 2025 03:03:15.092304945 CET50099445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.092365980 CET50099445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:15.100492954 CET4455009911.107.105.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.165364027 CET50100445192.168.2.4221.147.121.78
                                                  Jan 15, 2025 03:03:16.170387030 CET44550100221.147.121.78192.168.2.4
                                                  Jan 15, 2025 03:03:16.170468092 CET50100445192.168.2.4221.147.121.78
                                                  Jan 15, 2025 03:03:16.173000097 CET50100445192.168.2.4221.147.121.78
                                                  Jan 15, 2025 03:03:16.173168898 CET50101445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.177830935 CET44550100221.147.121.78192.168.2.4
                                                  Jan 15, 2025 03:03:16.177892923 CET50100445192.168.2.4221.147.121.78
                                                  Jan 15, 2025 03:03:16.177969933 CET44550101221.147.121.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.178025961 CET50101445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.178086996 CET50101445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.178390980 CET50102445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.182967901 CET44550101221.147.121.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.183012962 CET50101445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.183170080 CET44550102221.147.121.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.183218956 CET50102445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.183238983 CET50102445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:16.188054085 CET44550102221.147.121.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.403361082 CET445500397.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.403634071 CET50039445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:16.413145065 CET50039445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:16.413182974 CET50039445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:16.417995930 CET445500397.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.418013096 CET445500397.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.618235111 CET44550040210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.618349075 CET50040445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:03:16.620534897 CET50040445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:03:16.620604992 CET50040445192.168.2.4210.93.150.1
                                                  Jan 15, 2025 03:03:16.625329971 CET44550040210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.625407934 CET44550040210.93.150.1192.168.2.4
                                                  Jan 15, 2025 03:03:16.693109035 CET50103445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.698112011 CET44550103210.93.150.2192.168.2.4
                                                  Jan 15, 2025 03:03:16.698230982 CET50103445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.703978062 CET50103445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.708857059 CET44550103210.93.150.2192.168.2.4
                                                  Jan 15, 2025 03:03:16.708990097 CET50103445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.712562084 CET50104445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.717530012 CET44550104210.93.150.2192.168.2.4
                                                  Jan 15, 2025 03:03:16.717621088 CET50104445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.717662096 CET50104445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:16.722470045 CET44550104210.93.150.2192.168.2.4
                                                  Jan 15, 2025 03:03:17.174185038 CET50105445192.168.2.4141.128.233.193
                                                  Jan 15, 2025 03:03:17.179613113 CET44550105141.128.233.193192.168.2.4
                                                  Jan 15, 2025 03:03:17.179732084 CET50105445192.168.2.4141.128.233.193
                                                  Jan 15, 2025 03:03:17.179832935 CET50105445192.168.2.4141.128.233.193
                                                  Jan 15, 2025 03:03:17.180063009 CET50106445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.184710979 CET44550105141.128.233.193192.168.2.4
                                                  Jan 15, 2025 03:03:17.184775114 CET50105445192.168.2.4141.128.233.193
                                                  Jan 15, 2025 03:03:17.184814930 CET44550106141.128.233.1192.168.2.4
                                                  Jan 15, 2025 03:03:17.184861898 CET50106445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.184911966 CET50106445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.185235977 CET50107445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.189769030 CET44550106141.128.233.1192.168.2.4
                                                  Jan 15, 2025 03:03:17.189836979 CET50106445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.190084934 CET44550107141.128.233.1192.168.2.4
                                                  Jan 15, 2025 03:03:17.190155983 CET50107445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.190197945 CET50107445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:17.194900990 CET44550107141.128.233.1192.168.2.4
                                                  Jan 15, 2025 03:03:17.377111912 CET50108445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:17.382122993 CET4455010883.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:03:17.382220984 CET50108445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:17.382267952 CET50108445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:17.387067080 CET4455010883.143.88.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.111815929 CET50109445192.168.2.4223.4.242.222
                                                  Jan 15, 2025 03:03:18.116899014 CET44550109223.4.242.222192.168.2.4
                                                  Jan 15, 2025 03:03:18.117029905 CET50109445192.168.2.4223.4.242.222
                                                  Jan 15, 2025 03:03:18.117067099 CET50109445192.168.2.4223.4.242.222
                                                  Jan 15, 2025 03:03:18.117192984 CET50110445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.122033119 CET44550109223.4.242.222192.168.2.4
                                                  Jan 15, 2025 03:03:18.122096062 CET44550110223.4.242.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.122147083 CET50109445192.168.2.4223.4.242.222
                                                  Jan 15, 2025 03:03:18.122243881 CET50110445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.122401953 CET50110445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.122745991 CET50111445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.127228022 CET44550110223.4.242.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.127286911 CET50110445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.127588987 CET44550111223.4.242.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.127649069 CET50111445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.127696991 CET50111445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:18.132436991 CET44550111223.4.242.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.639569998 CET44550045133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.639792919 CET50045445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:03:18.640022039 CET50045445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:03:18.640149117 CET50045445192.168.2.4133.36.248.1
                                                  Jan 15, 2025 03:03:18.644843102 CET44550045133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.644927025 CET44550045133.36.248.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.705570936 CET50112445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.710628033 CET44550112133.36.248.2192.168.2.4
                                                  Jan 15, 2025 03:03:18.710782051 CET50112445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.710876942 CET50112445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.711558104 CET50113445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.715964079 CET44550112133.36.248.2192.168.2.4
                                                  Jan 15, 2025 03:03:18.716028929 CET50112445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.716437101 CET44550113133.36.248.2192.168.2.4
                                                  Jan 15, 2025 03:03:18.716587067 CET50113445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.716587067 CET50113445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:18.721496105 CET44550113133.36.248.2192.168.2.4
                                                  Jan 15, 2025 03:03:18.986814976 CET50114445192.168.2.4198.3.143.127
                                                  Jan 15, 2025 03:03:18.991980076 CET44550114198.3.143.127192.168.2.4
                                                  Jan 15, 2025 03:03:18.992063999 CET50114445192.168.2.4198.3.143.127
                                                  Jan 15, 2025 03:03:18.992104053 CET50114445192.168.2.4198.3.143.127
                                                  Jan 15, 2025 03:03:18.992331982 CET50115445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:18.997219086 CET44550115198.3.143.1192.168.2.4
                                                  Jan 15, 2025 03:03:18.997308016 CET44550114198.3.143.127192.168.2.4
                                                  Jan 15, 2025 03:03:18.997313976 CET50115445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:18.997355938 CET50114445192.168.2.4198.3.143.127
                                                  Jan 15, 2025 03:03:18.997468948 CET50115445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:18.997852087 CET50116445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:19.002569914 CET44550115198.3.143.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.002650023 CET50115445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:19.002721071 CET44550116198.3.143.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.002784967 CET50116445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:19.002824068 CET50116445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:19.007647038 CET44550116198.3.143.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.423999071 CET50117445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:19.429121971 CET445501177.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.429213047 CET50117445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:19.429236889 CET50117445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:19.434056997 CET445501177.187.163.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.814884901 CET50118445192.168.2.451.108.177.3
                                                  Jan 15, 2025 03:03:19.820703983 CET4455011851.108.177.3192.168.2.4
                                                  Jan 15, 2025 03:03:19.820822954 CET50118445192.168.2.451.108.177.3
                                                  Jan 15, 2025 03:03:19.820946932 CET50118445192.168.2.451.108.177.3
                                                  Jan 15, 2025 03:03:19.821203947 CET50119445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:19.826976061 CET4455011951.108.177.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.826986074 CET4455011851.108.177.3192.168.2.4
                                                  Jan 15, 2025 03:03:19.827095985 CET50118445192.168.2.451.108.177.3
                                                  Jan 15, 2025 03:03:19.827112913 CET50119445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:19.827569962 CET50120445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:19.833116055 CET4455012051.108.177.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.833210945 CET50120445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:19.833267927 CET50120445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:19.833277941 CET4455011951.108.177.1192.168.2.4
                                                  Jan 15, 2025 03:03:19.833336115 CET50119445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:19.838057041 CET4455012051.108.177.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.445807934 CET4455005094.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.445887089 CET50050445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:20.445934057 CET50050445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:20.445981979 CET50050445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:20.450745106 CET4455005094.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.450758934 CET4455005094.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.580602884 CET50121445192.168.2.4135.246.193.70
                                                  Jan 15, 2025 03:03:20.585527897 CET44550121135.246.193.70192.168.2.4
                                                  Jan 15, 2025 03:03:20.585685968 CET50121445192.168.2.4135.246.193.70
                                                  Jan 15, 2025 03:03:20.585685968 CET50121445192.168.2.4135.246.193.70
                                                  Jan 15, 2025 03:03:20.585840940 CET50122445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.590805054 CET44550121135.246.193.70192.168.2.4
                                                  Jan 15, 2025 03:03:20.590837002 CET44550122135.246.193.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.590910912 CET50121445192.168.2.4135.246.193.70
                                                  Jan 15, 2025 03:03:20.590941906 CET50122445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.591048002 CET50122445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.591566086 CET50123445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.597889900 CET44550122135.246.193.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.597987890 CET50122445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.598252058 CET44550123135.246.193.1192.168.2.4
                                                  Jan 15, 2025 03:03:20.598328114 CET50123445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.598368883 CET50123445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:20.603251934 CET44550123135.246.193.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.430953026 CET4455005361.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.431071043 CET50053445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:22.431113958 CET50053445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:22.431166887 CET50053445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:22.435935974 CET4455005361.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.436629057 CET4455005361.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.665188074 CET44550054196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.665328979 CET50054445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:03:22.665417910 CET50054445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:03:22.665493011 CET50054445192.168.2.4196.102.75.1
                                                  Jan 15, 2025 03:03:22.670242071 CET44550054196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.670299053 CET44550054196.102.75.1192.168.2.4
                                                  Jan 15, 2025 03:03:22.721046925 CET50130445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.725825071 CET44550130196.102.75.2192.168.2.4
                                                  Jan 15, 2025 03:03:22.725903988 CET50130445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.725943089 CET50130445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.726434946 CET50131445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.730995893 CET44550130196.102.75.2192.168.2.4
                                                  Jan 15, 2025 03:03:22.731060982 CET50130445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.733609915 CET44550131196.102.75.2192.168.2.4
                                                  Jan 15, 2025 03:03:22.733704090 CET50131445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.733750105 CET50131445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:22.738548994 CET44550131196.102.75.2192.168.2.4
                                                  Jan 15, 2025 03:03:23.455302000 CET50139445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:23.461209059 CET4455013994.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:03:23.461307049 CET50139445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:23.461348057 CET50139445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:23.466398954 CET4455013994.112.164.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.462812901 CET4455005972.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.462908983 CET50059445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:24.462963104 CET50059445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:24.463011980 CET50059445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:24.467814922 CET4455005972.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.467825890 CET4455005972.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.684829950 CET44550060135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.684915066 CET50060445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:24.684983015 CET50060445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:24.685043097 CET50060445192.168.2.4135.122.86.1
                                                  Jan 15, 2025 03:03:24.692323923 CET44550060135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.694720030 CET44550060135.122.86.1192.168.2.4
                                                  Jan 15, 2025 03:03:24.736557961 CET50155445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.741666079 CET44550155135.122.86.2192.168.2.4
                                                  Jan 15, 2025 03:03:24.741760015 CET50155445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.741821051 CET50155445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.742218971 CET50156445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.746766090 CET44550155135.122.86.2192.168.2.4
                                                  Jan 15, 2025 03:03:24.746841908 CET50155445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.747102976 CET44550156135.122.86.2192.168.2.4
                                                  Jan 15, 2025 03:03:24.747164011 CET50156445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.747189999 CET50156445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:24.751945019 CET44550156135.122.86.2192.168.2.4
                                                  Jan 15, 2025 03:03:25.439507961 CET50168445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:25.444353104 CET4455016861.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:25.444430113 CET50168445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:25.444833040 CET50168445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:25.449579954 CET4455016861.93.241.1192.168.2.4
                                                  Jan 15, 2025 03:03:25.889688969 CET44550062197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:25.889839888 CET50062445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:25.889904022 CET50062445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:25.889904022 CET50062445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:25.896156073 CET44550062197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:25.897263050 CET44550062197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:26.321362972 CET4455006755.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:26.321460009 CET50067445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:26.321501970 CET50067445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:26.321527004 CET50067445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:26.326318979 CET4455006755.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:26.326330900 CET4455006755.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:26.684593916 CET4455006849.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:26.684684038 CET50068445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:26.684720993 CET50068445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:26.684757948 CET50068445192.168.2.449.93.161.1
                                                  Jan 15, 2025 03:03:26.689508915 CET4455006849.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:26.689522028 CET4455006849.93.161.1192.168.2.4
                                                  Jan 15, 2025 03:03:26.736583948 CET50190445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.742440939 CET4455019049.93.161.2192.168.2.4
                                                  Jan 15, 2025 03:03:26.742516994 CET50190445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.742552996 CET50190445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.742995977 CET50191445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.747442961 CET4455019049.93.161.2192.168.2.4
                                                  Jan 15, 2025 03:03:26.747509003 CET50190445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.747760057 CET4455019149.93.161.2192.168.2.4
                                                  Jan 15, 2025 03:03:26.747826099 CET50191445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.747860909 CET50191445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:26.752648115 CET4455019149.93.161.2192.168.2.4
                                                  Jan 15, 2025 03:03:26.975413084 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:26.975528002 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:26.975572109 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:26.975613117 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:27.034923077 CET50195445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.177031994 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:27.177095890 CET50069445192.168.2.474.63.206.2
                                                  Jan 15, 2025 03:03:27.178291082 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:27.178302050 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:27.178328037 CET4455019574.63.206.3192.168.2.4
                                                  Jan 15, 2025 03:03:27.178420067 CET50195445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.178539991 CET50195445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.179852962 CET50199445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.181838036 CET4455006974.63.206.2192.168.2.4
                                                  Jan 15, 2025 03:03:27.183495045 CET4455019574.63.206.3192.168.2.4
                                                  Jan 15, 2025 03:03:27.183552027 CET50195445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.184746981 CET4455019974.63.206.3192.168.2.4
                                                  Jan 15, 2025 03:03:27.184825897 CET50199445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.184853077 CET50199445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:27.189678907 CET4455019974.63.206.3192.168.2.4
                                                  Jan 15, 2025 03:03:27.470808029 CET50208445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:27.479341030 CET4455020872.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:27.479449987 CET50208445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:27.479506016 CET50208445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:27.487257957 CET4455020872.192.147.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.073268890 CET44550072212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.073376894 CET50072445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:28.073405981 CET50072445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:28.073451996 CET50072445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:28.078237057 CET44550072212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.078265905 CET44550072212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.747354984 CET4455007338.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.747507095 CET50073445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:28.747572899 CET50073445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:28.747611046 CET50073445192.168.2.438.189.152.1
                                                  Jan 15, 2025 03:03:28.752471924 CET4455007338.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.752504110 CET4455007338.189.152.1192.168.2.4
                                                  Jan 15, 2025 03:03:28.798969030 CET50238445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.806340933 CET4455023838.189.152.2192.168.2.4
                                                  Jan 15, 2025 03:03:28.806410074 CET50238445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.806473017 CET50238445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.806847095 CET50241445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.814362049 CET4455023838.189.152.2192.168.2.4
                                                  Jan 15, 2025 03:03:28.814412117 CET50238445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.815840960 CET4455024138.189.152.2192.168.2.4
                                                  Jan 15, 2025 03:03:28.815902948 CET50241445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.815968990 CET50241445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:28.823724985 CET4455024138.189.152.2192.168.2.4
                                                  Jan 15, 2025 03:03:28.892740965 CET50244445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:28.897675037 CET44550244197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:28.897789955 CET50244445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:28.902971983 CET50244445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:28.907793045 CET44550244197.91.244.2192.168.2.4
                                                  Jan 15, 2025 03:03:29.330310106 CET50258445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:29.335342884 CET4455025855.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:29.335470915 CET50258445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:29.335522890 CET50258445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:29.340333939 CET4455025855.61.232.1192.168.2.4
                                                  Jan 15, 2025 03:03:29.727870941 CET4455007622.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:29.728020906 CET50076445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:29.728079081 CET50076445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:29.728126049 CET50076445192.168.2.422.55.71.1
                                                  Jan 15, 2025 03:03:29.732954979 CET4455007622.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:29.733005047 CET4455007622.55.71.1192.168.2.4
                                                  Jan 15, 2025 03:03:30.696625948 CET4455007727.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:30.696898937 CET50077445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:30.696899891 CET50077445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:30.696899891 CET50077445192.168.2.427.65.117.1
                                                  Jan 15, 2025 03:03:30.701816082 CET4455007727.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:30.701828957 CET4455007727.65.117.1192.168.2.4
                                                  Jan 15, 2025 03:03:30.752230883 CET50310445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.757143021 CET4455031027.65.117.2192.168.2.4
                                                  Jan 15, 2025 03:03:30.757246971 CET50310445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.757312059 CET50310445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.757867098 CET50311445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.762294054 CET4455031027.65.117.2192.168.2.4
                                                  Jan 15, 2025 03:03:30.762376070 CET50310445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.762690067 CET4455031127.65.117.2192.168.2.4
                                                  Jan 15, 2025 03:03:30.762757063 CET50311445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.762808084 CET50311445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:30.767574072 CET4455031127.65.117.2192.168.2.4
                                                  Jan 15, 2025 03:03:31.080281019 CET50329445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:31.088404894 CET44550329212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:31.088661909 CET50329445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:31.088663101 CET50329445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:31.096954107 CET44550329212.233.118.1192.168.2.4
                                                  Jan 15, 2025 03:03:31.247466087 CET44550081220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:31.247684956 CET50081445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:31.247685909 CET50081445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:31.247685909 CET50081445192.168.2.4220.187.236.1
                                                  Jan 15, 2025 03:03:31.252696037 CET44550081220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:31.252710104 CET44550081220.187.236.1192.168.2.4
                                                  Jan 15, 2025 03:03:32.803946018 CET4455008431.43.128.1192.168.2.4
                                                  Jan 15, 2025 03:03:32.804030895 CET50084445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:32.804375887 CET44550085106.81.11.1192.168.2.4
                                                  Jan 15, 2025 03:03:32.804438114 CET50085445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:33.102982998 CET4455008760.96.7.4192.168.2.4
                                                  Jan 15, 2025 03:03:33.103460073 CET50087445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:33.168951988 CET50156445192.168.2.4135.122.86.2
                                                  Jan 15, 2025 03:03:33.168984890 CET50168445192.168.2.461.93.241.1
                                                  Jan 15, 2025 03:03:33.168998957 CET50113445192.168.2.4133.36.248.2
                                                  Jan 15, 2025 03:03:33.169018030 CET50208445192.168.2.472.192.147.1
                                                  Jan 15, 2025 03:03:33.169039011 CET50258445192.168.2.455.61.232.1
                                                  Jan 15, 2025 03:03:33.169060946 CET50104445192.168.2.4210.93.150.2
                                                  Jan 15, 2025 03:03:33.169143915 CET50311445192.168.2.427.65.117.2
                                                  Jan 15, 2025 03:03:33.169156075 CET50096445192.168.2.4141.211.41.2
                                                  Jan 15, 2025 03:03:33.169177055 CET50087445192.168.2.460.96.7.4
                                                  Jan 15, 2025 03:03:33.169217110 CET50084445192.168.2.431.43.128.1
                                                  Jan 15, 2025 03:03:33.169224977 CET50085445192.168.2.4106.81.11.1
                                                  Jan 15, 2025 03:03:33.169248104 CET50090445192.168.2.450.231.69.1
                                                  Jan 15, 2025 03:03:33.169267893 CET50091445192.168.2.460.1.132.1
                                                  Jan 15, 2025 03:03:33.169287920 CET50094445192.168.2.426.242.207.1
                                                  Jan 15, 2025 03:03:33.169310093 CET50099445192.168.2.411.107.105.1
                                                  Jan 15, 2025 03:03:33.169328928 CET50102445192.168.2.4221.147.121.1
                                                  Jan 15, 2025 03:03:33.169359922 CET50107445192.168.2.4141.128.233.1
                                                  Jan 15, 2025 03:03:33.169373989 CET50108445192.168.2.483.143.88.1
                                                  Jan 15, 2025 03:03:33.169444084 CET50111445192.168.2.4223.4.242.1
                                                  Jan 15, 2025 03:03:33.169459105 CET50116445192.168.2.4198.3.143.1
                                                  Jan 15, 2025 03:03:33.169476032 CET50117445192.168.2.47.187.163.1
                                                  Jan 15, 2025 03:03:33.169507027 CET50120445192.168.2.451.108.177.1
                                                  Jan 15, 2025 03:03:33.169517994 CET50123445192.168.2.4135.246.193.1
                                                  Jan 15, 2025 03:03:33.169538975 CET50139445192.168.2.494.112.164.1
                                                  Jan 15, 2025 03:03:33.169564009 CET50131445192.168.2.4196.102.75.2
                                                  Jan 15, 2025 03:03:33.169586897 CET50191445192.168.2.449.93.161.2
                                                  Jan 15, 2025 03:03:33.169609070 CET50199445192.168.2.474.63.206.3
                                                  Jan 15, 2025 03:03:33.169629097 CET50244445192.168.2.4197.91.244.2
                                                  Jan 15, 2025 03:03:33.169655085 CET50241445192.168.2.438.189.152.2
                                                  Jan 15, 2025 03:03:33.169856071 CET50329445192.168.2.4212.233.118.1
                                                  Jan 15, 2025 03:03:34.361716986 CET4972480192.168.2.4199.232.210.172
                                                  Jan 15, 2025 03:03:34.366965055 CET8049724199.232.210.172192.168.2.4
                                                  Jan 15, 2025 03:03:34.367795944 CET4972480192.168.2.4199.232.210.172
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 15, 2025 03:02:45.898736954 CET138138192.168.2.4192.168.2.255

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:21:02:27
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\System32\loaddll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll"
                                                  Imagebase:0x110000
                                                  File size:126'464 bytes
                                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:21:02:27
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:21:02:27
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1
                                                  Imagebase:0x240000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:21:02:27
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:rundll32.exe C:\Users\user\Desktop\S8LDvVdtOk.dll,PlayGame
                                                  Imagebase:0x10000
                                                  File size:61'440 bytes
                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:21:02:27
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",#1
                                                  Imagebase:0x10000
                                                  File size:61'440 bytes
                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:21:02:27
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\mssecsvc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\WINDOWS\mssecsvc.exe
                                                  Imagebase:0x400000
                                                  File size:3'723'264 bytes
                                                  MD5 hash:04E178C7502AD997C41E30001CDED555
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1711655667.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1711889679.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1711889679.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:21:02:28
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\mssecsvc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                                  Imagebase:0x400000
                                                  File size:3'723'264 bytes
                                                  MD5 hash:04E178C7502AD997C41E30001CDED555
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1713770716.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2351187529.0000000001C80000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2351187529.0000000001C80000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1713913498.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1713913498.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2351455320.00000000021A3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2351455320.00000000021A3000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:21:02:28
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\tasksche.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                                  Imagebase:0x400000
                                                  File size:3'514'368 bytes
                                                  MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1716088204.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 100%, ReversingLabs
                                                  • Detection: 90%, Virustotal, Browse
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:21:02:30
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\S8LDvVdtOk.dll",PlayGame
                                                  Imagebase:0x10000
                                                  File size:61'440 bytes
                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:21:02:30
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\mssecsvc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\WINDOWS\mssecsvc.exe
                                                  Imagebase:0x400000
                                                  File size:3'723'264 bytes
                                                  MD5 hash:04E178C7502AD997C41E30001CDED555
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1742157775.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1739678024.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1742273790.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1742273790.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1739786619.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1739786619.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:21:02:30
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\tasksche.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                                  Imagebase:0x400000
                                                  File size:3'514'368 bytes
                                                  MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1741504305.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1741829358.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:77.5%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:63.2%
                                                    Total number of Nodes:38
                                                    Total number of Limit Nodes:2
                                                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 97 407c40 sprintf OpenSCManagerA 91->97 93 407f25 102 407ce0 GetModuleHandleW 93->102 96->90 98 407c74 CreateServiceA 97->98 99 407cca 97->99 100 407cbb CloseServiceHandle 98->100 101 407cad StartServiceA CloseServiceHandle 98->101 99->93 100->93 101->100 103 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 102->103 104 407f08 102->104 103->104 105 407d49 103->105 104->79 105->104 106 407d69 FindResourceA 105->106 106->104 107 407d84 LoadResource 106->107 107->104 108 407d94 LockResource 107->108 108->104 109 407da7 SizeofResource 108->109 109->104 110 407db9 sprintf sprintf MoveFileExA CreateFileA 109->110 110->104 111 407e54 WriteFile CloseHandle CreateProcessA 110->111 111->104 112 407ef2 CloseHandle CloseHandle 111->112 112->104

                                                    Callgraph

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                    • sprintf.MSVCRT ref: 00407E01
                                                    • sprintf.MSVCRT ref: 00407E18
                                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                    • CreateProcessA.KERNELBASE ref: 00407EE8
                                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1717017787.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1717002671.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717036186.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717089420.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                    • API String ID: 4281112323-1507730452
                                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                    Control-flow Graph

                                                    APIs
                                                    • sprintf.MSVCRT ref: 00407C56
                                                    • OpenSCManagerA.SECHOST(00000000,00000000,000F003F), ref: 00407C68
                                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1717017787.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1717002671.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717036186.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717089420.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                    • API String ID: 3340711343-4063779371
                                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1717017787.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1717002671.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717036186.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717089420.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                    • String ID:
                                                    • API String ID: 801014965-0
                                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                    Control-flow Graph

                                                    APIs
                                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1717017787.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1717002671.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717036186.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717089420.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Internet$CloseHandleOpen
                                                    • String ID:
                                                    • API String ID: 435140893-0
                                                    • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                    • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                                    • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                    • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                    • __p___argc.MSVCRT ref: 004080A5
                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1717017787.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1717002671.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717036186.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717049839.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717089420.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1717189889.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                    • String ID: mssecsvc2.0
                                                    • API String ID: 4274534310-3729025388
                                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                    Execution Graph

                                                    Execution Coverage:34.8%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:36
                                                    Total number of Limit Nodes:2

                                                    Callgraph

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                    • __p___argc.MSVCRT ref: 004080A5
                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2350348691.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.2350334273.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350361609.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350483408.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350498585.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                    • String ID: mssecsvc2.0
                                                    • API String ID: 4274534310-3729025388
                                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                    Control-flow Graph

                                                    APIs
                                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2350348691.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.2350334273.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350361609.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350483408.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350498585.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Internet$CloseHandleOpen
                                                    • String ID:
                                                    • API String ID: 435140893-0
                                                    • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                    • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                                    • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                    • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                                    Control-flow Graph

                                                    APIs
                                                    • sprintf.MSVCRT ref: 00407C56
                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2350348691.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.2350334273.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350361609.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350483408.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350498585.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                    • API String ID: 3340711343-4063779371
                                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                    • sprintf.MSVCRT ref: 00407E01
                                                    • sprintf.MSVCRT ref: 00407E18
                                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2350348691.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.2350334273.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350361609.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350483408.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350498585.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                    • API String ID: 4072214828-1507730452
                                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.2350348691.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.2350334273.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350361609.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350429142.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350468498.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350483408.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350498585.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000006.00000002.2350572631.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                    • String ID:
                                                    • API String ID: 801014965-0
                                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                                    APIs
                                                    • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: /../$/..\$\../$\..\
                                                    • API String ID: 3510742995-3885502717
                                                    • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                    • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                                    • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                    • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                    • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                    • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                    • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                    • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                    • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                                    • API String ID: 2238633743-2459060434
                                                    • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                    • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                                    • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                    • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                                    APIs
                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                                    • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$CloseHandleOpen$ManagerStart
                                                    • String ID: cmd.exe /c "%s"
                                                    • API String ID: 1485051382-955883872
                                                    • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                    • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                                    • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                    • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                                    APIs
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                                    • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                                    • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??0exception@@ExceptionThrow$memcpy
                                                    • String ID:
                                                    • API String ID: 1881450474-3916222277
                                                    • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                    • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                                    • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                    • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                                    APIs
                                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                                    • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                                    • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                                    • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                                    • String ID: WANACRY!
                                                    • API String ID: 283026544-1240840912
                                                    • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                    • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                                    • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                    • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                                    APIs
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                                    • String ID: $Q;@
                                                    • API String ID: 2382887404-262343263
                                                    • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                    • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                                    • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                    • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                                    APIs
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                                    • String ID:
                                                    • API String ID: 2382887404-3916222277
                                                    • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                    • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                                    • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                    • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                                    APIs
                                                    • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Heap$FreeProcessfree
                                                    • String ID:
                                                    • API String ID: 3428986607-0
                                                    • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                    • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                                    • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                    • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                                    APIs
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??0exception@@ExceptionThrow
                                                    • String ID:
                                                    • API String ID: 941485209-0
                                                    • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                    • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                                    • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                    • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                                    APIs
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??0exception@@ExceptionThrow
                                                    • String ID:
                                                    • API String ID: 941485209-0
                                                    • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                    • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                                    • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                    • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID:
                                                    • API String ID: 3510742995-0
                                                    • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                    • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                                    • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                    • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                                    APIs
                                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ContextCryptRelease
                                                    • String ID:
                                                    • API String ID: 829835001-0
                                                    • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                    • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                                    • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                    • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                    • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                                    • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                    • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                    • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                                    • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                    • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                                    APIs
                                                      • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                                    • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                                    • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                                    • API String ID: 2238633743-1294736154
                                                    • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                    • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                                    • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                    • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %s%s$%s%s%s$:$\
                                                    • API String ID: 0-1100577047
                                                    • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                    • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                                    • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                    • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                                    APIs
                                                    • __p___argv.MSVCRT(0040F538), ref: 00402040
                                                    • strcmp.MSVCRT(?), ref: 0040204B
                                                    • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                                    • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                      • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                                    • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                                    • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                                    • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                                      • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                      • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                      • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                      • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                                    • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                                    • API String ID: 1074704982-2844324180
                                                    • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                    • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                                    • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                    • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                                    APIs
                                                    • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                                    • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                                    • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                                    • strlen.MSVCRT(?), ref: 004011A7
                                                    • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                                    • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                                    • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                                    • String ID: 0@$Software\$WanaCrypt0r
                                                    • API String ID: 865909632-3421300005
                                                    • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                    • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                                    • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                    • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                    • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                    • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                                    • String ID: %s\Intel$%s\ProgramData
                                                    • API String ID: 3806094219-198707228
                                                    • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                    • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                                    • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                    • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                                    APIs
                                                      • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                                    • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                                    • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                                    • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                                      • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                                    • SetLastError.KERNEL32(0000045A), ref: 00402430
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                                    • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                                    • API String ID: 1900561814-3657104962
                                                    • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                    • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                                    • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                    • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                                    APIs
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                                    • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                                    • String ID: %s\%s
                                                    • API String ID: 1036847564-4073750446
                                                    • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                    • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                                    • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                    • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                                    • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                                    • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                                    • CloseHandle.KERNEL32(?), ref: 004010EC
                                                    • CloseHandle.KERNEL32(?), ref: 004010F1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                                    • String ID: D
                                                    • API String ID: 786732093-2746444292
                                                    • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                    • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                                    • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                    • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                                    APIs
                                                    • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                                    • __p__fmode.MSVCRT ref: 004077FC
                                                    • __p__commode.MSVCRT ref: 0040780A
                                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                                    • String ID:
                                                    • API String ID: 3626615345-0
                                                    • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                    • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                                    • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                    • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                                    APIs
                                                    • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                      • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                    • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                                    • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                                    • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                                    • String ID:
                                                    • API String ID: 2141228402-0
                                                    • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                    • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                                    • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                    • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                                    APIs
                                                    • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                                    • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                                    • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Read$realloc
                                                    • String ID: ?!@
                                                    • API String ID: 1241503663-708128716
                                                    • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                    • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                                    • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                    • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: rand$wcslen$ComputerNamesrand
                                                    • String ID:
                                                    • API String ID: 3058258771-0
                                                    • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                    • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                                    • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                    • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                                    • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                                    • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                                    • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                                    • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                                    • String ID:
                                                    • API String ID: 2935503933-0
                                                    • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                    • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                                    • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                    • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                                    APIs
                                                    • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                                    • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                                    • Sleep.KERNEL32(000003E8), ref: 00401F40
                                                    • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleMutexOpenSleepsprintf
                                                    • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                                    • API String ID: 2780352083-2959021817
                                                    • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                    • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                                    • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                    • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                                    APIs
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                                    • String ID:
                                                    • API String ID: 2382887404-0
                                                    • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                    • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                                    • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                    • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                                    APIs
                                                    • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                                    • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                                    • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                                    • fclose.MSVCRT(00000000), ref: 00401058
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: fclosefopenfreadfwrite
                                                    • String ID: c.wnry
                                                    • API String ID: 4000964834-3240288721
                                                    • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                    • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                                    • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                    • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                                    APIs
                                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                                    • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                                    • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                                    • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                                    • String ID:
                                                    • API String ID: 2811923685-0
                                                    • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                    • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                                    • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                    • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$Pointer$??2@Create
                                                    • String ID:
                                                    • API String ID: 1331958074-0
                                                    • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                    • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                                    • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                    • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                                    APIs
                                                    • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                                    • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast_stricmp
                                                    • String ID: P!@
                                                    • API String ID: 1278613211-1774101457
                                                    • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                    • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                                    • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                    • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                                    APIs
                                                    • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                                    • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AttributesFilestrcmp
                                                    • String ID: c.wnry
                                                    • API String ID: 3324900478-3240288721
                                                    • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                    • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                                    • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                    • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                                    APIs
                                                    • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ??3@CloseHandle
                                                    • String ID: $l@
                                                    • API String ID: 3816424416-2140230165
                                                    • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                    • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                                    • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                    • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                                    • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1716570010.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1716539937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716598783.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716616789.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000007.00000002.1716630996.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$Entermemcpy
                                                    • String ID:
                                                    • API String ID: 3435569088-0
                                                    • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                    • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                                    • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                    • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65