Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zgAMfHzvZN.dll

Overview

General Information

Sample name:zgAMfHzvZN.dll
renamed because original name is a hash value
Original sample name:3c3591eb1df1f5f60cc846685303fb58.dll
Analysis ID:1591879
MD5:3c3591eb1df1f5f60cc846685303fb58
SHA1:d0c3fd09e35ca27aa28099dd5c28f2f0b3f28e2b
SHA256:92e19d8feec6650171bd8d60954fc3af2d253002b64547ad22e4761ad74fdb90
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7484 cmdline: loaddll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7536 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7568 cmdline: rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7552 cmdline: rundll32.exe C:\Users\user\Desktop\zgAMfHzvZN.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7624 cmdline: C:\WINDOWS\mssecsvc.exe MD5: D21D12114F36CB9CD7AF57659151D441)
        • tasksche.exe (PID: 7784 cmdline: C:\WINDOWS\tasksche.exe /i MD5: D7F2C9304928C99E1D6856FDF2E75F5F)
    • rundll32.exe (PID: 7904 cmdline: rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7924 cmdline: C:\WINDOWS\mssecsvc.exe MD5: D21D12114F36CB9CD7AF57659151D441)
        • tasksche.exe (PID: 7988 cmdline: C:\WINDOWS\tasksche.exe /i MD5: D7F2C9304928C99E1D6856FDF2E75F5F)
  • mssecsvc.exe (PID: 7716 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: D21D12114F36CB9CD7AF57659151D441)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
zgAMfHzvZN.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    zgAMfHzvZN.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    zgAMfHzvZN.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      0000000C.00000000.1462996462.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000006.00000000.1431412188.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000C.00000002.1463916151.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          0000000B.00000002.1464405629.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            8.2.mssecsvc.exe.1b01084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            8.2.mssecsvc.exe.1b01084.3.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            8.2.mssecsvc.exe.202b8c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            8.2.mssecsvc.exe.202b8c8.7.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            8.2.mssecsvc.exe.1b33128.5.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 138 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: zgAMfHzvZN.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 97%
              Source: C:\WINDOWS\qeriuwjhrf (copy)Virustotal: Detection: 93%Perma Link
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
              Source: C:\Windows\tasksche.exeVirustotal: Detection: 93%Perma Link
              Source: zgAMfHzvZN.dllReversingLabs: Detection: 94%
              Source: zgAMfHzvZN.dllVirustotal: Detection: 93%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: zgAMfHzvZN.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: zgAMfHzvZN.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: unknownNetwork traffic detected: IP country count 10
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownTCP traffic detected without corresponding DNS query: 13.107.253.45
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
              Source: Yara matchFile source: zgAMfHzvZN.dll, type: SAMPLE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.20368e8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.203a948.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1b0c0a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1b10104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1431412188.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1464405629.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1437702648.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1460455923.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1431540630.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1464568997.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1437906578.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1460672967.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2082920782.0000000001B10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2083173264.000000000203A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7624, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7924, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: zgAMfHzvZN.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: zgAMfHzvZN.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1b01084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b01084.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.202b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.202b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.20368e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.20368e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.203a948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.203a948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1b0c0a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b0c0a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1b10104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1b10104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000000.1462996462.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000002.1463916151.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1442084897.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1431540630.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.1464568997.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.1437906578.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.1460672967.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2082920782.0000000001B10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2083173264.000000000203A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
              Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: zgAMfHzvZN.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: zgAMfHzvZN.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: zgAMfHzvZN.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1b01084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b01084.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.202b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.202b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1b33128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.203a948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1b10104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.205d96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.205d96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1b33128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.202b8c8.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.20368e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.20368e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1b01084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.203a948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.203a948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1b0c0a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b0c0a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1b10104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1b10104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000000.1462996462.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000002.1463916151.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1442084897.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1431540630.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.1464568997.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.1437906578.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.1460672967.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2082920782.0000000001B10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2083173264.000000000203A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000009.00000000.1442084897.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000000.1462996462.000000000040E000.00000008.00000001.01000000.00000007.sdmp, zgAMfHzvZN.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@0/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7492:120:WilError_03
              Source: zgAMfHzvZN.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\zgAMfHzvZN.dll,PlayGame
              Source: zgAMfHzvZN.dllReversingLabs: Detection: 94%
              Source: zgAMfHzvZN.dllVirustotal: Detection: 93%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\zgAMfHzvZN.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\zgAMfHzvZN.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: zgAMfHzvZN.dllStatic file information: File size 5267459 > 1048576
              Source: zgAMfHzvZN.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7748Thread sleep count: 92 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7748Thread sleep time: -184000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7756Thread sleep count: 131 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7756Thread sleep count: 34 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7748Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 0000000B.00000002.1464894307.0000000000D84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG
              Source: mssecsvc.exe, 00000006.00000002.1446975766.0000000000DF6000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2082619210.0000000000DAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1591879 Sample: zgAMfHzvZN.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 4 other signatures 2->54 8 loaddll32.exe 1 2->8         started        10 mssecsvc.exe 2->10         started        process3 dnsIp4 14 rundll32.exe 8->14         started        16 rundll32.exe 8->16         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        40 192.168.2.102 unknown unknown 10->40 42 192.168.2.103 unknown unknown 10->42 44 98 other IPs or domains 10->44 58 Connects to many different private IPs via SMB (likely to spread or exploit) 10->58 60 Connects to many different private IPs (likely to spread or exploit) 10->60 signatures5 process6 signatures7 23 mssecsvc.exe 1 14->23         started        46 Drops executables to the windows directory (C:\Windows) and starts them 16->46 26 mssecsvc.exe 1 16->26         started        29 rundll32.exe 1 19->29         started        process8 file9 36 C:\Windows\tasksche.exe, PE32 23->36 dropped 31 tasksche.exe 23->31         started        38 C:\WINDOWS\qeriuwjhrf (copy), PE32 26->38 dropped 56 Drops executables to the windows directory (C:\Windows) and starts them 26->56 34 tasksche.exe 26->34         started        signatures10 process11 signatures12 62 Detected Wannacry Ransomware 31->62 64 Antivirus detection for dropped file 31->64 66 Multi AV Scanner detection for dropped file 31->66 68 Machine Learning detection for dropped file 31->68

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              zgAMfHzvZN.dll95%ReversingLabsWin32.Ransomware.WannaCry
              zgAMfHzvZN.dll93%VirustotalBrowse
              zgAMfHzvZN.dll100%AviraTR/AD.WannaCry.pskpy
              zgAMfHzvZN.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)98%ReversingLabsWin32.Ransomware.WannaCry
              C:\WINDOWS\qeriuwjhrf (copy)93%VirustotalBrowse
              C:\Windows\tasksche.exe98%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe93%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              37.99.112.1
              unknownKazakhstan
              21299KAR-TEL-ASAlmatyRepublicofKazakhstanKZfalse
              160.31.57.154
              unknownUnited States
              2907SINET-ASResearchOrganizationofInformationandSystemsNfalse
              40.138.142.52
              unknownUnited States
              32196DIRECTINSUSfalse
              35.6.2.1
              unknownUnited States
              36375UMICH-AS-5USfalse
              131.92.83.97
              unknownUnited States
              213DNIC-AS-00213USfalse
              125.89.6.1
              unknownChina
              4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
              131.92.83.1
              unknownUnited States
              213DNIC-AS-00213USfalse
              220.126.220.22
              unknownKorea Republic of
              4766KIXS-AS-KRKoreaTelecomKRfalse
              11.78.48.141
              unknownUnited States
              3356LEVEL3USfalse
              153.113.213.1
              unknownUnited States
              1906NORTHROP-GRUMMANUSfalse
              178.220.235.2
              unknownSerbia
              8400TELEKOM-ASRSfalse
              178.220.235.1
              unknownSerbia
              8400TELEKOM-ASRSfalse
              212.113.42.154
              unknownUkraine
              6849UKRTELNETUAfalse
              38.136.20.66
              unknownUnited States
              174COGENT-174USfalse
              81.106.104.11
              unknownUnited Kingdom
              5089NTLGBfalse
              35.134.115.1
              unknownUnited States
              20115CHARTER-20115USfalse
              35.134.115.2
              unknownUnited States
              20115CHARTER-20115USfalse
              98.103.218.167
              unknownUnited States
              10796TWC-10796-MIDWESTUSfalse
              78.12.175.207
              unknownItaly
              8612TISCALI-ITfalse
              181.142.212.2
              unknownColombia
              13489EPMTelecomunicacionesSAESPCOfalse
              IP
              192.168.2.148
              192.168.2.149
              192.168.2.146
              192.168.2.147
              192.168.2.140
              192.168.2.141
              192.168.2.144
              192.168.2.145
              192.168.2.142
              192.168.2.143
              192.168.2.159
              192.168.2.157
              192.168.2.158
              192.168.2.151
              192.168.2.152
              192.168.2.150
              192.168.2.155
              192.168.2.156
              192.168.2.153
              192.168.2.154
              192.168.2.126
              192.168.2.247
              192.168.2.127
              192.168.2.248
              192.168.2.124
              192.168.2.245
              192.168.2.125
              192.168.2.246
              192.168.2.128
              192.168.2.249
              192.168.2.129
              192.168.2.240
              192.168.2.122
              192.168.2.243
              192.168.2.123
              192.168.2.244
              192.168.2.120
              192.168.2.241
              192.168.2.121
              192.168.2.242
              192.168.2.97
              192.168.2.137
              192.168.2.96
              192.168.2.138
              192.168.2.99
              192.168.2.135
              192.168.2.98
              192.168.2.136
              192.168.2.139
              192.168.2.250
              192.168.2.130
              192.168.2.251
              192.168.2.91
              192.168.2.90
              192.168.2.93
              192.168.2.133
              192.168.2.254
              192.168.2.92
              192.168.2.134
              192.168.2.95
              192.168.2.131
              192.168.2.252
              192.168.2.94
              192.168.2.132
              192.168.2.253
              192.168.2.104
              192.168.2.225
              192.168.2.105
              192.168.2.226
              192.168.2.102
              192.168.2.223
              192.168.2.103
              192.168.2.224
              192.168.2.108
              192.168.2.229
              192.168.2.109
              192.168.2.106
              192.168.2.227
              192.168.2.107
              192.168.2.228
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1591879
              Start date and time:2025-01-15 15:13:10 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 36s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:16
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:zgAMfHzvZN.dll
              renamed because original name is a hash value
              Original Sample Name:3c3591eb1df1f5f60cc846685303fb58.dll
              Detection:MAL
              Classification:mal100.rans.expl.evad.winDLL@20/2@0/100
              EGA Information:
              • Successful, ratio: 66.7%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .dll
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 4.245.163.56
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target tasksche.exe, PID 7784 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              09:14:12API Interceptor1x Sleep call for process: loaddll32.exe modified
              09:14:45API Interceptor112x Sleep call for process: mssecsvc.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              DNIC-AS-00213USXPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
              • 131.92.109.248
              XUlSYmwgTV.elfGet hashmaliciousMiraiBrowse
              • 131.92.49.127
              x86.elfGet hashmaliciousMirai, MoobotBrowse
              • 131.92.49.117
              Cj1mRQdRCL.elfGet hashmaliciousMirai, MoobotBrowse
              • 131.92.109.250
              R8c6sZLVQi.elfGet hashmaliciousMirai, MoobotBrowse
              • 131.92.109.254
              KOfIj1NrBu.elfGet hashmaliciousMiraiBrowse
              • 131.92.49.125
              zZMmONZWnO.dllGet hashmaliciousWannacryBrowse
              • 131.92.102.118
              SINET-ASResearchOrganizationofInformationandSystemsNbC61G18iPf.dllGet hashmaliciousWannacryBrowse
              • 163.149.244.2
              mips.elfGet hashmaliciousMiraiBrowse
              • 157.111.123.159
              6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
              • 133.222.94.93
              meth10.elfGet hashmaliciousMiraiBrowse
              • 157.84.108.126
              m68k.elfGet hashmaliciousUnknownBrowse
              • 133.14.26.229
              arm5.elfGet hashmaliciousUnknownBrowse
              • 202.35.222.61
              meth14.elfGet hashmaliciousMiraiBrowse
              • 157.115.3.97
              meth2.elfGet hashmaliciousMiraiBrowse
              • 157.102.206.240
              arm7.elfGet hashmaliciousMiraiBrowse
              • 160.31.170.63
              meth7.elfGet hashmaliciousMiraiBrowse
              • 157.114.152.229
              UMICH-AS-5US6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
              • 35.61.65.8
              res.mpsl.elfGet hashmaliciousUnknownBrowse
              • 35.12.3.218
              6.elfGet hashmaliciousUnknownBrowse
              • 35.60.28.137
              Fantazy.i486.elfGet hashmaliciousUnknownBrowse
              • 35.30.35.134
              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
              • 35.37.42.19
              sora.mpsl.elfGet hashmaliciousUnknownBrowse
              • 35.7.96.26
              sora.ppc.elfGet hashmaliciousUnknownBrowse
              • 35.18.165.47
              sora.sh4.elfGet hashmaliciousUnknownBrowse
              • 35.45.178.140
              6.elfGet hashmaliciousUnknownBrowse
              • 35.36.174.107
              sora.spc.elfGet hashmaliciousMiraiBrowse
              • 35.24.43.28
              KAR-TEL-ASAlmatyRepublicofKazakhstanKZloligang.x86.elfGet hashmaliciousMiraiBrowse
              • 31.132.84.94
              armv5l.elfGet hashmaliciousMiraiBrowse
              • 37.99.8.155
              hmips.elfGet hashmaliciousMiraiBrowse
              • 92.49.241.175
              nshkarm7.elfGet hashmaliciousMiraiBrowse
              • 92.49.241.187
              la.bot.arm7.elfGet hashmaliciousMiraiBrowse
              • 85.29.150.107
              la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
              • 176.124.83.185
              bot.spc.elfGet hashmaliciousMiraiBrowse
              • 85.29.150.126
              armv5l.elfGet hashmaliciousMiraiBrowse
              • 5.34.81.103
              newtpp.exeGet hashmaliciousXmrigBrowse
              • 37.99.52.150
              nuklear.arm.elfGet hashmaliciousMirai, MoobotBrowse
              • 91.244.109.17
              No context
              No context
              Process:C:\Windows\mssecsvc.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):3514368
              Entropy (8bit):5.999910067849817
              Encrypted:false
              SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:QqPoBhz1aRxcSUDk36SAEdhvxWa9
              MD5:D7F2C9304928C99E1D6856FDF2E75F5F
              SHA1:1B2BD87F52C95FA4E129B1EF25C8538D5D4BE7B5
              SHA-256:26213E7FE08C90F11ED7E38C9BE6A50D3FC4EADF884F4F06E51D7F20F71676B7
              SHA-512:091D342951D2C029E9F4C571EEA9C58D27F092CA2B913EC8DECAF4C823AD4AF5E1A04FDF3B53B1A7DDA2352B26E8A610B14E7C0BF03D46712E19E6A067E72D1F
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 98%
              • Antivirus: Virustotal, Detection: 93%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\mssecsvc.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):3514368
              Entropy (8bit):5.999910067849817
              Encrypted:false
              SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:QqPoBhz1aRxcSUDk36SAEdhvxWa9
              MD5:D7F2C9304928C99E1D6856FDF2E75F5F
              SHA1:1B2BD87F52C95FA4E129B1EF25C8538D5D4BE7B5
              SHA-256:26213E7FE08C90F11ED7E38C9BE6A50D3FC4EADF884F4F06E51D7F20F71676B7
              SHA-512:091D342951D2C029E9F4C571EEA9C58D27F092CA2B913EC8DECAF4C823AD4AF5E1A04FDF3B53B1A7DDA2352B26E8A610B14E7C0BF03D46712E19E6A067E72D1F
              Malicious:true
              Yara Hits:
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 98%
              • Antivirus: Virustotal, Detection: 93%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Entropy (8bit):4.591509329976976
              TrID:
              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
              • Generic Win/DOS Executable (2004/3) 0.20%
              • DOS Executable Generic (2002/1) 0.20%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:zgAMfHzvZN.dll
              File size:5'267'459 bytes
              MD5:3c3591eb1df1f5f60cc846685303fb58
              SHA1:d0c3fd09e35ca27aa28099dd5c28f2f0b3f28e2b
              SHA256:92e19d8feec6650171bd8d60954fc3af2d253002b64547ad22e4761ad74fdb90
              SHA512:f23a38cd00a83bb35a707fd821fd7dd3b706c77fe36b1e03819c0a1cf61424b54163aae0741b7ae6cd14f8a0399c34738500eca897390baa04c102525099eaea
              SSDEEP:49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:d8qPoBhz1aRxcSUDk36SAEdhvxWa9
              TLSH:7E363358717CD5FCD10A19B804A7CA57E6B33C6666FE6A0F8F408A661D03B19FB90B43
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
              Icon Hash:7ae282899bbab082
              Entrypoint:0x100011e9
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x10000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              DLL Characteristics:
              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
              Instruction
              push ebp
              mov ebp, esp
              push ebx
              mov ebx, dword ptr [ebp+08h]
              push esi
              mov esi, dword ptr [ebp+0Ch]
              push edi
              mov edi, dword ptr [ebp+10h]
              test esi, esi
              jne 00007F5210AD714Bh
              cmp dword ptr [10003140h], 00000000h
              jmp 00007F5210AD7168h
              cmp esi, 01h
              je 00007F5210AD7147h
              cmp esi, 02h
              jne 00007F5210AD7164h
              mov eax, dword ptr [10003150h]
              test eax, eax
              je 00007F5210AD714Bh
              push edi
              push esi
              push ebx
              call eax
              test eax, eax
              je 00007F5210AD714Eh
              push edi
              push esi
              push ebx
              call 00007F5210AD705Ah
              test eax, eax
              jne 00007F5210AD7146h
              xor eax, eax
              jmp 00007F5210AD7190h
              push edi
              push esi
              push ebx
              call 00007F5210AD6F0Ch
              cmp esi, 01h
              mov dword ptr [ebp+0Ch], eax
              jne 00007F5210AD714Eh
              test eax, eax
              jne 00007F5210AD7179h
              push edi
              push eax
              push ebx
              call 00007F5210AD7036h
              test esi, esi
              je 00007F5210AD7147h
              cmp esi, 03h
              jne 00007F5210AD7168h
              push edi
              push esi
              push ebx
              call 00007F5210AD7025h
              test eax, eax
              jne 00007F5210AD7145h
              and dword ptr [ebp+0Ch], eax
              cmp dword ptr [ebp+0Ch], 00000000h
              je 00007F5210AD7153h
              mov eax, dword ptr [10003150h]
              test eax, eax
              je 00007F5210AD714Ah
              push edi
              push esi
              push ebx
              call eax
              mov dword ptr [ebp+0Ch], eax
              mov eax, dword ptr [ebp+0Ch]
              pop edi
              pop esi
              pop ebx
              pop ebp
              retn 000Ch
              jmp dword ptr [10002028h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              Programming Language:
              • [ C ] VS98 (6.0) build 8168
              • [C++] VS98 (6.0) build 8168
              • [RES] VS98 (6.0) cvtres build 1720
              • [LNK] VS98 (6.0) imp/exp build 8168
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x40000x5000600x501000ea6a8a64c34e0d3f676bb8d8d889decaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              W0x40600x500000dataEnglishUnited States0.8770351409912109
              DLLImport
              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
              NameOrdinalAddress
              PlayGame10x10001114
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Jan 15, 2025 15:14:02.812803984 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.815522909 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.841501951 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.841547012 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.841629028 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.844141006 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.844242096 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.851584911 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.861150026 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.863358021 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.907408953 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.910259962 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.927357912 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.929657936 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.948460102 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.948489904 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:02.948544025 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.950330019 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.950385094 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:02.955334902 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.002087116 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.004590988 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.023808956 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.025933981 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.037184000 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.039330006 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.059818029 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.059880972 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.059951067 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.062751055 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.062751055 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.068547964 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.117609978 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.120479107 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.131002903 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.133083105 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.143729925 CET49676443192.168.2.852.182.143.211
              Jan 15, 2025 15:14:03.145787001 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.147746086 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.164007902 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.164031029 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.164187908 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.166140079 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.166313887 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.171098948 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.224776030 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.227186918 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.239547968 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.241744041 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.250730038 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.252749920 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.274544001 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.274584055 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.274691105 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.280497074 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.281735897 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.286602020 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.333375931 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.335989952 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.345233917 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.347851038 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.362423897 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.364939928 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.389858007 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.389897108 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.390002966 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.393112898 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.394082069 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.398876905 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.440834045 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.443530083 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.457648039 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.459867954 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.477588892 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.479626894 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.502512932 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.502552032 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.502640009 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.505637884 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.506351948 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.511229038 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.551558018 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.554092884 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.571499109 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.573965073 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.589210987 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.591686964 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.613878965 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.613919020 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.614025116 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.617242098 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.617866993 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.622823000 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.681394100 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.684067965 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.691751957 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.693694115 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.711827040 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.713978052 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.753360987 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.753381014 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.753395081 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.753483057 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.756539106 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.757159948 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.761918068 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.795130014 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.795162916 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.795217037 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.838748932 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.840318918 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.840409994 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.843331099 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.845093012 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.868709087 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.868725061 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.868782043 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.871673107 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.872700930 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.877465963 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.956698895 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.959317923 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.962935925 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.962954998 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.962970018 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.963001966 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.963033915 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.965740919 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.966129065 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.978521109 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.991754055 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.991811991 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.991825104 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:03.991889000 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:03.993910074 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.040271997 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.049616098 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.052881002 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.057713032 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.060725927 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.060739040 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.060750961 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.060784101 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.062686920 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.075459957 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.075475931 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.075508118 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.075545073 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.078417063 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.078829050 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.083580971 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.144594908 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.146982908 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.154376984 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.156111956 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.170022964 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.171849966 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.192895889 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.192917109 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.192962885 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.195174932 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.244209051 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.247980118 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.263515949 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.263592005 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.279486895 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.331214905 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.350799084 CET4434970513.107.253.45192.168.2.8
              Jan 15, 2025 15:14:04.393692970 CET49705443192.168.2.813.107.253.45
              Jan 15, 2025 15:14:04.409368038 CET49671443192.168.2.8204.79.197.203
              Jan 15, 2025 15:14:04.753132105 CET4967780192.168.2.8192.229.211.108
              Jan 15, 2025 15:14:05.643735886 CET49673443192.168.2.823.206.229.226
              Jan 15, 2025 15:14:05.893718958 CET49672443192.168.2.823.206.229.226
              Jan 15, 2025 15:14:11.399597883 CET49706445192.168.2.8220.126.220.22
              Jan 15, 2025 15:14:11.405410051 CET44549706220.126.220.22192.168.2.8
              Jan 15, 2025 15:14:11.405534029 CET49706445192.168.2.8220.126.220.22
              Jan 15, 2025 15:14:11.406297922 CET49706445192.168.2.8220.126.220.22
              Jan 15, 2025 15:14:11.406506062 CET49707445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.412240028 CET44549706220.126.220.22192.168.2.8
              Jan 15, 2025 15:14:11.412421942 CET44549707220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:11.412496090 CET49706445192.168.2.8220.126.220.22
              Jan 15, 2025 15:14:11.412504911 CET49707445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.412619114 CET49707445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.418546915 CET44549707220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:11.418952942 CET49707445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.423101902 CET49708445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.429081917 CET44549708220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:11.429198980 CET49708445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.429286003 CET49708445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:11.435108900 CET44549708220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:12.753099918 CET49676443192.168.2.852.182.143.211
              Jan 15, 2025 15:14:13.364610910 CET49730445192.168.2.835.134.115.30
              Jan 15, 2025 15:14:13.369508028 CET4454973035.134.115.30192.168.2.8
              Jan 15, 2025 15:14:13.369581938 CET49730445192.168.2.835.134.115.30
              Jan 15, 2025 15:14:13.369636059 CET49730445192.168.2.835.134.115.30
              Jan 15, 2025 15:14:13.369972944 CET49731445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.375910997 CET4454973035.134.115.30192.168.2.8
              Jan 15, 2025 15:14:13.375929117 CET4454973135.134.115.1192.168.2.8
              Jan 15, 2025 15:14:13.375961065 CET49730445192.168.2.835.134.115.30
              Jan 15, 2025 15:14:13.376092911 CET49731445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.376092911 CET49731445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.378562927 CET49732445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.382456064 CET4454973135.134.115.1192.168.2.8
              Jan 15, 2025 15:14:13.382551908 CET49731445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.383398056 CET4454973235.134.115.1192.168.2.8
              Jan 15, 2025 15:14:13.383474112 CET49732445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.383544922 CET49732445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:13.388953924 CET4454973235.134.115.1192.168.2.8
              Jan 15, 2025 15:14:15.253156900 CET49673443192.168.2.823.206.229.226
              Jan 15, 2025 15:14:15.378273010 CET4967780192.168.2.8192.229.211.108
              Jan 15, 2025 15:14:15.379904985 CET49753445192.168.2.8160.31.57.154
              Jan 15, 2025 15:14:15.384808064 CET44549753160.31.57.154192.168.2.8
              Jan 15, 2025 15:14:15.384886026 CET49753445192.168.2.8160.31.57.154
              Jan 15, 2025 15:14:15.384922028 CET49753445192.168.2.8160.31.57.154
              Jan 15, 2025 15:14:15.385221958 CET49754445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.389976978 CET44549753160.31.57.154192.168.2.8
              Jan 15, 2025 15:14:15.390027046 CET49753445192.168.2.8160.31.57.154
              Jan 15, 2025 15:14:15.390043020 CET44549754160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:15.390093088 CET49754445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.390119076 CET49754445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.391161919 CET49755445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.395334959 CET44549754160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:15.395389080 CET49754445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.395983934 CET44549755160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:15.396039963 CET49755445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.396083117 CET49755445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:15.400892019 CET44549755160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:15.503093004 CET49672443192.168.2.823.206.229.226
              Jan 15, 2025 15:14:17.170125008 CET4434970423.206.229.226192.168.2.8
              Jan 15, 2025 15:14:17.170221090 CET49704443192.168.2.823.206.229.226
              Jan 15, 2025 15:14:17.406186104 CET49778445192.168.2.876.33.192.61
              Jan 15, 2025 15:14:17.411218882 CET4454977876.33.192.61192.168.2.8
              Jan 15, 2025 15:14:17.411334038 CET49778445192.168.2.876.33.192.61
              Jan 15, 2025 15:14:17.411406994 CET49778445192.168.2.876.33.192.61
              Jan 15, 2025 15:14:17.411674976 CET49779445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.419224024 CET4454977876.33.192.61192.168.2.8
              Jan 15, 2025 15:14:17.419236898 CET4454977876.33.192.61192.168.2.8
              Jan 15, 2025 15:14:17.419250011 CET4454977976.33.192.1192.168.2.8
              Jan 15, 2025 15:14:17.419301033 CET49778445192.168.2.876.33.192.61
              Jan 15, 2025 15:14:17.419329882 CET49779445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.419435978 CET49779445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.420607090 CET49780445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.425365925 CET4454977976.33.192.1192.168.2.8
              Jan 15, 2025 15:14:17.425379992 CET4454977976.33.192.1192.168.2.8
              Jan 15, 2025 15:14:17.425426960 CET49779445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.426489115 CET4454978076.33.192.1192.168.2.8
              Jan 15, 2025 15:14:17.426578999 CET49780445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.426625967 CET49780445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:17.431355000 CET4454978076.33.192.1192.168.2.8
              Jan 15, 2025 15:14:19.410432100 CET49803445192.168.2.8181.142.212.105
              Jan 15, 2025 15:14:19.415255070 CET44549803181.142.212.105192.168.2.8
              Jan 15, 2025 15:14:19.415366888 CET49803445192.168.2.8181.142.212.105
              Jan 15, 2025 15:14:19.415406942 CET49803445192.168.2.8181.142.212.105
              Jan 15, 2025 15:14:19.415558100 CET49804445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.420209885 CET44549803181.142.212.105192.168.2.8
              Jan 15, 2025 15:14:19.420275927 CET44549803181.142.212.105192.168.2.8
              Jan 15, 2025 15:14:19.420289040 CET44549804181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:19.420486927 CET49803445192.168.2.8181.142.212.105
              Jan 15, 2025 15:14:19.420521975 CET49804445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.420663118 CET49804445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.421552896 CET49805445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.425478935 CET44549804181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:19.425642967 CET49804445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.426305056 CET44549805181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:19.426422119 CET49805445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.426517963 CET49805445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:19.431250095 CET44549805181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:21.426135063 CET49827445192.168.2.8210.164.90.226
              Jan 15, 2025 15:14:21.431040049 CET44549827210.164.90.226192.168.2.8
              Jan 15, 2025 15:14:21.431164026 CET49827445192.168.2.8210.164.90.226
              Jan 15, 2025 15:14:21.431225061 CET49827445192.168.2.8210.164.90.226
              Jan 15, 2025 15:14:21.431463003 CET49828445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.436173916 CET44549827210.164.90.226192.168.2.8
              Jan 15, 2025 15:14:21.436242104 CET49827445192.168.2.8210.164.90.226
              Jan 15, 2025 15:14:21.436295033 CET44549828210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:21.436356068 CET49828445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.436392069 CET49828445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.437223911 CET49829445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.441298962 CET44549828210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:21.441361904 CET49828445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.442002058 CET44549829210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:21.442066908 CET49829445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.442118883 CET49829445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:21.446850061 CET44549829210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:23.441365004 CET49851445192.168.2.881.154.25.155
              Jan 15, 2025 15:14:23.446157932 CET4454985181.154.25.155192.168.2.8
              Jan 15, 2025 15:14:23.446238041 CET49851445192.168.2.881.154.25.155
              Jan 15, 2025 15:14:23.446271896 CET49851445192.168.2.881.154.25.155
              Jan 15, 2025 15:14:23.446417093 CET49852445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.451220036 CET4454985281.154.25.1192.168.2.8
              Jan 15, 2025 15:14:23.451239109 CET4454985181.154.25.155192.168.2.8
              Jan 15, 2025 15:14:23.451332092 CET49852445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.451334000 CET49851445192.168.2.881.154.25.155
              Jan 15, 2025 15:14:23.451435089 CET49852445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.451723099 CET49853445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.456899881 CET4454985381.154.25.1192.168.2.8
              Jan 15, 2025 15:14:23.456963062 CET49853445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.456993103 CET49853445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.457051039 CET4454985281.154.25.1192.168.2.8
              Jan 15, 2025 15:14:23.457098961 CET49852445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:23.461882114 CET4454985381.154.25.1192.168.2.8
              Jan 15, 2025 15:14:25.456820965 CET49877445192.168.2.8178.220.235.16
              Jan 15, 2025 15:14:25.461730957 CET44549877178.220.235.16192.168.2.8
              Jan 15, 2025 15:14:25.461833954 CET49877445192.168.2.8178.220.235.16
              Jan 15, 2025 15:14:25.461874962 CET49877445192.168.2.8178.220.235.16
              Jan 15, 2025 15:14:25.462016106 CET49878445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.466810942 CET44549878178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:25.466891050 CET49878445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.466902971 CET44549877178.220.235.16192.168.2.8
              Jan 15, 2025 15:14:25.466913939 CET49878445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.466962099 CET49877445192.168.2.8178.220.235.16
              Jan 15, 2025 15:14:25.467236996 CET49879445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.472054958 CET44549879178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:25.472121000 CET49879445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.472182035 CET49879445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.472332954 CET44549878178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:25.472393036 CET49878445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:25.477035046 CET44549879178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:27.472646952 CET49900445192.168.2.8146.108.83.92
              Jan 15, 2025 15:14:27.477519989 CET44549900146.108.83.92192.168.2.8
              Jan 15, 2025 15:14:27.477634907 CET49900445192.168.2.8146.108.83.92
              Jan 15, 2025 15:14:27.477653027 CET49900445192.168.2.8146.108.83.92
              Jan 15, 2025 15:14:27.477809906 CET49901445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.482568026 CET44549901146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:27.482642889 CET49901445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.482672930 CET44549900146.108.83.92192.168.2.8
              Jan 15, 2025 15:14:27.482731104 CET49900445192.168.2.8146.108.83.92
              Jan 15, 2025 15:14:27.482827902 CET49901445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.483112097 CET49902445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.487889051 CET44549901146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:27.487901926 CET44549902146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:27.487958908 CET49901445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.487977028 CET49902445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.487998009 CET49902445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:27.492808104 CET44549902146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:29.488476992 CET49925445192.168.2.838.136.20.66
              Jan 15, 2025 15:14:29.493391037 CET4454992538.136.20.66192.168.2.8
              Jan 15, 2025 15:14:29.493499994 CET49925445192.168.2.838.136.20.66
              Jan 15, 2025 15:14:29.493516922 CET49925445192.168.2.838.136.20.66
              Jan 15, 2025 15:14:29.493680000 CET49926445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:29.498611927 CET4454992638.136.20.1192.168.2.8
              Jan 15, 2025 15:14:29.498794079 CET49926445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:29.498861074 CET49926445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:29.498898029 CET4454992538.136.20.66192.168.2.8
              Jan 15, 2025 15:14:29.498955965 CET49925445192.168.2.838.136.20.66
              Jan 15, 2025 15:14:29.499218941 CET49927445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:29.504120111 CET4454992738.136.20.1192.168.2.8
              Jan 15, 2025 15:14:29.504194021 CET49927445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:29.504225016 CET49927445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:29.504244089 CET4454992638.136.20.1192.168.2.8
              Jan 15, 2025 15:14:29.509087086 CET4454992738.136.20.1192.168.2.8
              Jan 15, 2025 15:14:29.511596918 CET4454992638.136.20.1192.168.2.8
              Jan 15, 2025 15:14:29.511662006 CET49926445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:31.503539085 CET49950445192.168.2.840.138.142.52
              Jan 15, 2025 15:14:31.508819103 CET4454995040.138.142.52192.168.2.8
              Jan 15, 2025 15:14:31.508903980 CET49950445192.168.2.840.138.142.52
              Jan 15, 2025 15:14:31.508949041 CET49950445192.168.2.840.138.142.52
              Jan 15, 2025 15:14:31.509063959 CET49951445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:31.513983965 CET4454995140.138.142.1192.168.2.8
              Jan 15, 2025 15:14:31.514045000 CET49951445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:31.514075994 CET49951445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:31.514076948 CET4454995040.138.142.52192.168.2.8
              Jan 15, 2025 15:14:31.514146090 CET49950445192.168.2.840.138.142.52
              Jan 15, 2025 15:14:31.514411926 CET49952445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:31.519282103 CET4454995240.138.142.1192.168.2.8
              Jan 15, 2025 15:14:31.519345999 CET49952445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:31.519423962 CET49952445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:31.520248890 CET4454995140.138.142.1192.168.2.8
              Jan 15, 2025 15:14:31.524338007 CET4454995240.138.142.1192.168.2.8
              Jan 15, 2025 15:14:31.524795055 CET4454995140.138.142.1192.168.2.8
              Jan 15, 2025 15:14:31.524840117 CET49951445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:32.810535908 CET44549708220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:32.810703993 CET49708445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:32.810703993 CET49708445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:32.810754061 CET49708445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:32.815582991 CET44549708220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:32.815593958 CET44549708220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:33.519447088 CET49975445192.168.2.8212.113.42.154
              Jan 15, 2025 15:14:33.525645018 CET44549975212.113.42.154192.168.2.8
              Jan 15, 2025 15:14:33.525762081 CET49975445192.168.2.8212.113.42.154
              Jan 15, 2025 15:14:33.525794029 CET49975445192.168.2.8212.113.42.154
              Jan 15, 2025 15:14:33.525899887 CET49976445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.531774044 CET44549976212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:33.531845093 CET49976445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.531861067 CET49976445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.531951904 CET44549975212.113.42.154192.168.2.8
              Jan 15, 2025 15:14:33.532028913 CET49975445192.168.2.8212.113.42.154
              Jan 15, 2025 15:14:33.532198906 CET49977445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.537059069 CET44549977212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:33.537159920 CET49977445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.537467957 CET44549976212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:33.537560940 CET49976445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.538958073 CET49977445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:33.543793917 CET44549977212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:34.764437914 CET4454973235.134.115.1192.168.2.8
              Jan 15, 2025 15:14:34.764518976 CET49732445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:34.764599085 CET49732445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:34.764688015 CET49732445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:34.769362926 CET4454973235.134.115.1192.168.2.8
              Jan 15, 2025 15:14:34.769423008 CET4454973235.134.115.1192.168.2.8
              Jan 15, 2025 15:14:35.557185888 CET49999445192.168.2.860.183.236.33
              Jan 15, 2025 15:14:35.562098980 CET4454999960.183.236.33192.168.2.8
              Jan 15, 2025 15:14:35.562220097 CET49999445192.168.2.860.183.236.33
              Jan 15, 2025 15:14:35.564008951 CET49999445192.168.2.860.183.236.33
              Jan 15, 2025 15:14:35.564143896 CET50001445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.568927050 CET4455000160.183.236.1192.168.2.8
              Jan 15, 2025 15:14:35.569032907 CET50001445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.569276094 CET4454999960.183.236.33192.168.2.8
              Jan 15, 2025 15:14:35.569324017 CET49999445192.168.2.860.183.236.33
              Jan 15, 2025 15:14:35.570614100 CET50001445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.574268103 CET50002445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.575418949 CET4455000160.183.236.1192.168.2.8
              Jan 15, 2025 15:14:35.575481892 CET50001445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.579122066 CET4455000260.183.236.1192.168.2.8
              Jan 15, 2025 15:14:35.579200983 CET50002445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.579216003 CET50002445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:35.583990097 CET4455000260.183.236.1192.168.2.8
              Jan 15, 2025 15:14:35.817178011 CET50003445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:35.822105885 CET44550003220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:35.822201967 CET50003445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:35.822282076 CET50003445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:35.827033043 CET44550003220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:36.784857988 CET44549755160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:36.785084963 CET49755445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:36.785183907 CET49755445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:36.785263062 CET49755445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:36.790020943 CET44549755160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:36.790029049 CET44549755160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:37.566246033 CET50005445192.168.2.8125.89.6.41
              Jan 15, 2025 15:14:37.571398973 CET44550005125.89.6.41192.168.2.8
              Jan 15, 2025 15:14:37.575105906 CET50005445192.168.2.8125.89.6.41
              Jan 15, 2025 15:14:37.575105906 CET50005445192.168.2.8125.89.6.41
              Jan 15, 2025 15:14:37.575264931 CET50006445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.580116987 CET44550006125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:37.580209970 CET44550005125.89.6.41192.168.2.8
              Jan 15, 2025 15:14:37.580293894 CET50006445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.580363035 CET50005445192.168.2.8125.89.6.41
              Jan 15, 2025 15:14:37.580423117 CET50006445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.580661058 CET50007445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.585978985 CET44550006125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:37.586025000 CET44550007125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:37.586083889 CET50006445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.586102962 CET50007445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.586152077 CET50007445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:37.591206074 CET44550007125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:37.769237995 CET50008445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:37.774370909 CET4455000835.134.115.1192.168.2.8
              Jan 15, 2025 15:14:37.775044918 CET50008445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:37.775110006 CET50008445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:37.780242920 CET4455000835.134.115.1192.168.2.8
              Jan 15, 2025 15:14:38.794797897 CET4454978076.33.192.1192.168.2.8
              Jan 15, 2025 15:14:38.794905901 CET49780445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:38.795217037 CET49780445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:38.799940109 CET4454978076.33.192.1192.168.2.8
              Jan 15, 2025 15:14:39.582022905 CET50009445192.168.2.866.246.170.93
              Jan 15, 2025 15:14:39.586920977 CET4455000966.246.170.93192.168.2.8
              Jan 15, 2025 15:14:39.587017059 CET50009445192.168.2.866.246.170.93
              Jan 15, 2025 15:14:39.587218046 CET50009445192.168.2.866.246.170.93
              Jan 15, 2025 15:14:39.587404966 CET50010445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.592180967 CET4455001066.246.170.1192.168.2.8
              Jan 15, 2025 15:14:39.592284918 CET4455000966.246.170.93192.168.2.8
              Jan 15, 2025 15:14:39.592375040 CET50009445192.168.2.866.246.170.93
              Jan 15, 2025 15:14:39.592396021 CET50010445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.592470884 CET50010445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.592770100 CET50011445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.597405910 CET4455001066.246.170.1192.168.2.8
              Jan 15, 2025 15:14:39.597456932 CET50010445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.597532988 CET4455001166.246.170.1192.168.2.8
              Jan 15, 2025 15:14:39.597630024 CET50011445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.597630024 CET50011445192.168.2.866.246.170.1
              Jan 15, 2025 15:14:39.602453947 CET4455001166.246.170.1192.168.2.8
              Jan 15, 2025 15:14:39.800681114 CET50012445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:39.805550098 CET44550012160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:39.805696011 CET50012445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:39.805814981 CET50012445192.168.2.8160.31.57.1
              Jan 15, 2025 15:14:39.810570002 CET44550012160.31.57.1192.168.2.8
              Jan 15, 2025 15:14:40.783256054 CET44549805181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:40.785135984 CET49805445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:40.785136938 CET49805445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:40.785248041 CET49805445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:40.789894104 CET44549805181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:40.789956093 CET44549805181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:41.597553968 CET50013445192.168.2.8202.1.124.140
              Jan 15, 2025 15:14:41.602412939 CET44550013202.1.124.140192.168.2.8
              Jan 15, 2025 15:14:41.602541924 CET50013445192.168.2.8202.1.124.140
              Jan 15, 2025 15:14:41.602582932 CET50013445192.168.2.8202.1.124.140
              Jan 15, 2025 15:14:41.602824926 CET50014445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.607631922 CET44550014202.1.124.1192.168.2.8
              Jan 15, 2025 15:14:41.607713938 CET50014445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.607741117 CET50014445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.608100891 CET50015445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.608203888 CET44550013202.1.124.140192.168.2.8
              Jan 15, 2025 15:14:41.608257055 CET50013445192.168.2.8202.1.124.140
              Jan 15, 2025 15:14:41.612674952 CET44550014202.1.124.1192.168.2.8
              Jan 15, 2025 15:14:41.612735033 CET50014445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.612967014 CET44550015202.1.124.1192.168.2.8
              Jan 15, 2025 15:14:41.613039017 CET50015445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.613091946 CET50015445192.168.2.8202.1.124.1
              Jan 15, 2025 15:14:41.617919922 CET44550015202.1.124.1192.168.2.8
              Jan 15, 2025 15:14:41.825615883 CET50016445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:41.830527067 CET4455001676.33.192.1192.168.2.8
              Jan 15, 2025 15:14:41.830600977 CET50016445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:41.830666065 CET50016445192.168.2.876.33.192.1
              Jan 15, 2025 15:14:41.835433006 CET4455001676.33.192.1192.168.2.8
              Jan 15, 2025 15:14:42.814342022 CET44549829210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:42.814496994 CET49829445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:42.814558983 CET49829445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:42.814639091 CET49829445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:42.819453001 CET44549829210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:42.819489002 CET44549829210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:43.613121033 CET50017445192.168.2.837.99.112.18
              Jan 15, 2025 15:14:43.617932081 CET4455001737.99.112.18192.168.2.8
              Jan 15, 2025 15:14:43.618083000 CET50017445192.168.2.837.99.112.18
              Jan 15, 2025 15:14:43.618083000 CET50017445192.168.2.837.99.112.18
              Jan 15, 2025 15:14:43.618324995 CET50018445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.623073101 CET4455001837.99.112.1192.168.2.8
              Jan 15, 2025 15:14:43.623123884 CET50018445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.623142958 CET4455001737.99.112.18192.168.2.8
              Jan 15, 2025 15:14:43.623162031 CET50018445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.623313904 CET50017445192.168.2.837.99.112.18
              Jan 15, 2025 15:14:43.623470068 CET50019445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.628051996 CET4455001837.99.112.1192.168.2.8
              Jan 15, 2025 15:14:43.628102064 CET50018445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.628206968 CET4455001937.99.112.1192.168.2.8
              Jan 15, 2025 15:14:43.628307104 CET50019445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.628307104 CET50019445192.168.2.837.99.112.1
              Jan 15, 2025 15:14:43.633095980 CET4455001937.99.112.1192.168.2.8
              Jan 15, 2025 15:14:43.800565958 CET50020445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:43.805422068 CET44550020181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:43.805600882 CET50020445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:43.805600882 CET50020445192.168.2.8181.142.212.1
              Jan 15, 2025 15:14:43.810502052 CET44550020181.142.212.1192.168.2.8
              Jan 15, 2025 15:14:44.828109026 CET4454985381.154.25.1192.168.2.8
              Jan 15, 2025 15:14:44.828196049 CET49853445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:44.828237057 CET49853445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:44.828299046 CET49853445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:44.833061934 CET4454985381.154.25.1192.168.2.8
              Jan 15, 2025 15:14:44.833091974 CET4454985381.154.25.1192.168.2.8
              Jan 15, 2025 15:14:45.660183907 CET50021445192.168.2.881.106.104.11
              Jan 15, 2025 15:14:45.665091038 CET4455002181.106.104.11192.168.2.8
              Jan 15, 2025 15:14:45.665183067 CET50021445192.168.2.881.106.104.11
              Jan 15, 2025 15:14:45.665278912 CET50021445192.168.2.881.106.104.11
              Jan 15, 2025 15:14:45.665386915 CET50022445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.670273066 CET4455002281.106.104.1192.168.2.8
              Jan 15, 2025 15:14:45.670372963 CET50022445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.674514055 CET50022445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.674833059 CET50023445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.676266909 CET4455002181.106.104.11192.168.2.8
              Jan 15, 2025 15:14:45.679665089 CET4455002381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:45.679744005 CET50023445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.680280924 CET4455002281.106.104.1192.168.2.8
              Jan 15, 2025 15:14:45.681396008 CET50023445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.682651997 CET4455002181.106.104.11192.168.2.8
              Jan 15, 2025 15:14:45.682751894 CET50021445192.168.2.881.106.104.11
              Jan 15, 2025 15:14:45.682972908 CET4455002281.106.104.1192.168.2.8
              Jan 15, 2025 15:14:45.683027983 CET50022445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:45.686142921 CET4455002381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:45.816047907 CET50024445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:45.820826054 CET44550024210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:45.820949078 CET50024445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:45.824975967 CET50024445192.168.2.8210.164.90.1
              Jan 15, 2025 15:14:45.829726934 CET44550024210.164.90.1192.168.2.8
              Jan 15, 2025 15:14:46.828528881 CET44549879178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:46.828591108 CET49879445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:46.828643084 CET49879445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:46.828672886 CET49879445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:46.833489895 CET44549879178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:46.833508968 CET44549879178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:47.402761936 CET4455002381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:47.402863979 CET50023445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:47.402863979 CET50023445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:47.402960062 CET50023445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:47.407862902 CET4455002381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:47.407876968 CET4455002381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:47.535064936 CET50025445192.168.2.866.182.74.238
              Jan 15, 2025 15:14:47.539846897 CET4455002566.182.74.238192.168.2.8
              Jan 15, 2025 15:14:47.539938927 CET50025445192.168.2.866.182.74.238
              Jan 15, 2025 15:14:47.539966106 CET50025445192.168.2.866.182.74.238
              Jan 15, 2025 15:14:47.540096998 CET50026445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.544974089 CET4455002666.182.74.1192.168.2.8
              Jan 15, 2025 15:14:47.545002937 CET4455002566.182.74.238192.168.2.8
              Jan 15, 2025 15:14:47.545025110 CET50026445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.545049906 CET50025445192.168.2.866.182.74.238
              Jan 15, 2025 15:14:47.545139074 CET50026445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.545484066 CET50027445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.550069094 CET4455002666.182.74.1192.168.2.8
              Jan 15, 2025 15:14:47.550117970 CET50026445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.550199986 CET4455002766.182.74.1192.168.2.8
              Jan 15, 2025 15:14:47.550259113 CET50027445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.550308943 CET50027445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:47.555027962 CET4455002766.182.74.1192.168.2.8
              Jan 15, 2025 15:14:47.831531048 CET50028445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:47.836477041 CET4455002881.154.25.1192.168.2.8
              Jan 15, 2025 15:14:47.836618900 CET50028445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:47.839037895 CET50028445192.168.2.881.154.25.1
              Jan 15, 2025 15:14:47.843883991 CET4455002881.154.25.1192.168.2.8
              Jan 15, 2025 15:14:48.842200041 CET44549902146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:48.842320919 CET49902445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:48.842366934 CET49902445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:48.842411041 CET49902445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:48.847913027 CET44549902146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:48.847929955 CET44549902146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:49.145145893 CET4455002766.182.74.1192.168.2.8
              Jan 15, 2025 15:14:49.145250082 CET50027445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:49.165209055 CET50027445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:49.165249109 CET50027445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:49.170025110 CET4455002766.182.74.1192.168.2.8
              Jan 15, 2025 15:14:49.170041084 CET4455002766.182.74.1192.168.2.8
              Jan 15, 2025 15:14:49.284872055 CET50029445192.168.2.835.6.2.63
              Jan 15, 2025 15:14:49.289755106 CET4455002935.6.2.63192.168.2.8
              Jan 15, 2025 15:14:49.289844036 CET50029445192.168.2.835.6.2.63
              Jan 15, 2025 15:14:49.289938927 CET50029445192.168.2.835.6.2.63
              Jan 15, 2025 15:14:49.290056944 CET50030445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.294918060 CET4455002935.6.2.63192.168.2.8
              Jan 15, 2025 15:14:49.294951916 CET4455003035.6.2.1192.168.2.8
              Jan 15, 2025 15:14:49.294979095 CET50029445192.168.2.835.6.2.63
              Jan 15, 2025 15:14:49.295021057 CET50030445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.295085907 CET50030445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.295305014 CET50031445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.301340103 CET4455003035.6.2.1192.168.2.8
              Jan 15, 2025 15:14:49.301372051 CET4455003135.6.2.1192.168.2.8
              Jan 15, 2025 15:14:49.301398039 CET50030445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.301439047 CET50031445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.301455021 CET50031445192.168.2.835.6.2.1
              Jan 15, 2025 15:14:49.307513952 CET4455003135.6.2.1192.168.2.8
              Jan 15, 2025 15:14:49.831531048 CET50032445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:49.836505890 CET44550032178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:49.836585045 CET50032445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:49.836621046 CET50032445192.168.2.8178.220.235.1
              Jan 15, 2025 15:14:49.841491938 CET44550032178.220.235.1192.168.2.8
              Jan 15, 2025 15:14:50.409723043 CET50033445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:50.414557934 CET4455003381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:50.414659977 CET50033445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:50.414707899 CET50033445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:50.419481993 CET4455003381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:50.875135899 CET4454992738.136.20.1192.168.2.8
              Jan 15, 2025 15:14:50.875245094 CET49927445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:50.875328064 CET49927445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:50.875389099 CET49927445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:50.880079031 CET4454992738.136.20.1192.168.2.8
              Jan 15, 2025 15:14:50.880198956 CET4454992738.136.20.1192.168.2.8
              Jan 15, 2025 15:14:50.927938938 CET50034445192.168.2.811.78.48.141
              Jan 15, 2025 15:14:50.932852030 CET4455003411.78.48.141192.168.2.8
              Jan 15, 2025 15:14:50.932945013 CET50034445192.168.2.811.78.48.141
              Jan 15, 2025 15:14:50.933016062 CET50034445192.168.2.811.78.48.141
              Jan 15, 2025 15:14:50.933310986 CET50035445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.938066959 CET4455003411.78.48.141192.168.2.8
              Jan 15, 2025 15:14:50.938126087 CET4455003511.78.48.1192.168.2.8
              Jan 15, 2025 15:14:50.938133001 CET50034445192.168.2.811.78.48.141
              Jan 15, 2025 15:14:50.938237906 CET50035445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.938292980 CET50035445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.938747883 CET50036445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.943300009 CET4455003511.78.48.1192.168.2.8
              Jan 15, 2025 15:14:50.943377018 CET50035445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.943564892 CET4455003611.78.48.1192.168.2.8
              Jan 15, 2025 15:14:50.943628073 CET50036445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.943675041 CET50036445192.168.2.811.78.48.1
              Jan 15, 2025 15:14:50.948548079 CET4455003611.78.48.1192.168.2.8
              Jan 15, 2025 15:14:51.847429991 CET50037445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:51.852437019 CET44550037146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:51.852555990 CET50037445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:51.852591038 CET50037445192.168.2.8146.108.83.1
              Jan 15, 2025 15:14:51.857454062 CET44550037146.108.83.1192.168.2.8
              Jan 15, 2025 15:14:52.011102915 CET4455003381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:52.011198044 CET50033445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:52.011368990 CET50033445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:52.011409998 CET50033445192.168.2.881.106.104.1
              Jan 15, 2025 15:14:52.016184092 CET4455003381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:52.016195059 CET4455003381.106.104.1192.168.2.8
              Jan 15, 2025 15:14:52.065937042 CET50038445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.071046114 CET4455003881.106.104.2192.168.2.8
              Jan 15, 2025 15:14:52.071213007 CET50038445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.071213007 CET50038445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.071600914 CET50039445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.076356888 CET4455003881.106.104.2192.168.2.8
              Jan 15, 2025 15:14:52.076652050 CET4455003981.106.104.2192.168.2.8
              Jan 15, 2025 15:14:52.076713085 CET50039445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.076736927 CET50039445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.076914072 CET4455003881.106.104.2192.168.2.8
              Jan 15, 2025 15:14:52.076970100 CET50038445192.168.2.881.106.104.2
              Jan 15, 2025 15:14:52.081602097 CET4455003981.106.104.2192.168.2.8
              Jan 15, 2025 15:14:52.175338030 CET50040445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:52.180598021 CET4455004066.182.74.1192.168.2.8
              Jan 15, 2025 15:14:52.180737972 CET50040445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:52.180761099 CET50040445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:52.185599089 CET4455004066.182.74.1192.168.2.8
              Jan 15, 2025 15:14:52.457056999 CET50041445192.168.2.8200.95.54.223
              Jan 15, 2025 15:14:52.462084055 CET44550041200.95.54.223192.168.2.8
              Jan 15, 2025 15:14:52.462188005 CET50041445192.168.2.8200.95.54.223
              Jan 15, 2025 15:14:52.462201118 CET50041445192.168.2.8200.95.54.223
              Jan 15, 2025 15:14:52.462378979 CET50042445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.467236996 CET44550042200.95.54.1192.168.2.8
              Jan 15, 2025 15:14:52.467319965 CET50042445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.467356920 CET50042445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.467495918 CET44550041200.95.54.223192.168.2.8
              Jan 15, 2025 15:14:52.467560053 CET50041445192.168.2.8200.95.54.223
              Jan 15, 2025 15:14:52.467741013 CET50043445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.472342968 CET44550042200.95.54.1192.168.2.8
              Jan 15, 2025 15:14:52.472359896 CET44550042200.95.54.1192.168.2.8
              Jan 15, 2025 15:14:52.472409964 CET50042445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.472656012 CET44550043200.95.54.1192.168.2.8
              Jan 15, 2025 15:14:52.472718000 CET50043445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.472755909 CET50043445192.168.2.8200.95.54.1
              Jan 15, 2025 15:14:52.477552891 CET44550043200.95.54.1192.168.2.8
              Jan 15, 2025 15:14:52.982649088 CET4454995240.138.142.1192.168.2.8
              Jan 15, 2025 15:14:52.982726097 CET49952445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:52.982767105 CET49952445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:52.982810974 CET49952445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:52.987528086 CET4454995240.138.142.1192.168.2.8
              Jan 15, 2025 15:14:52.987538099 CET4454995240.138.142.1192.168.2.8
              Jan 15, 2025 15:14:53.752376080 CET4455004066.182.74.1192.168.2.8
              Jan 15, 2025 15:14:53.752475977 CET50040445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:53.752885103 CET50040445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:53.752914906 CET50040445192.168.2.866.182.74.1
              Jan 15, 2025 15:14:53.757771015 CET4455004066.182.74.1192.168.2.8
              Jan 15, 2025 15:14:53.757788897 CET4455004066.182.74.1192.168.2.8
              Jan 15, 2025 15:14:53.844688892 CET50044445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.849500895 CET4455004466.182.74.2192.168.2.8
              Jan 15, 2025 15:14:53.849579096 CET50044445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.849667072 CET50044445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.854564905 CET4455004466.182.74.2192.168.2.8
              Jan 15, 2025 15:14:53.854644060 CET50044445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.892544985 CET50045445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:53.897449017 CET4455004538.136.20.1192.168.2.8
              Jan 15, 2025 15:14:53.897516966 CET50045445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:53.901063919 CET50045445192.168.2.838.136.20.1
              Jan 15, 2025 15:14:53.905898094 CET4455004538.136.20.1192.168.2.8
              Jan 15, 2025 15:14:53.920582056 CET50046445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.925637960 CET4455004666.182.74.2192.168.2.8
              Jan 15, 2025 15:14:53.925702095 CET50046445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.930403948 CET50046445192.168.2.866.182.74.2
              Jan 15, 2025 15:14:53.935276031 CET4455004666.182.74.2192.168.2.8
              Jan 15, 2025 15:14:54.158879995 CET50047445192.168.2.8198.38.143.183
              Jan 15, 2025 15:14:54.164513111 CET44550047198.38.143.183192.168.2.8
              Jan 15, 2025 15:14:54.164594889 CET50047445192.168.2.8198.38.143.183
              Jan 15, 2025 15:14:54.164690018 CET50047445192.168.2.8198.38.143.183
              Jan 15, 2025 15:14:54.164855003 CET50048445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.169681072 CET44550048198.38.143.1192.168.2.8
              Jan 15, 2025 15:14:54.169745922 CET50048445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.169773102 CET50048445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.169795036 CET44550047198.38.143.183192.168.2.8
              Jan 15, 2025 15:14:54.169845104 CET50047445192.168.2.8198.38.143.183
              Jan 15, 2025 15:14:54.170458078 CET50049445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.174689054 CET44550048198.38.143.1192.168.2.8
              Jan 15, 2025 15:14:54.174748898 CET50048445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.175235033 CET44550049198.38.143.1192.168.2.8
              Jan 15, 2025 15:14:54.175297022 CET50049445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.175328970 CET50049445192.168.2.8198.38.143.1
              Jan 15, 2025 15:14:54.180139065 CET44550049198.38.143.1192.168.2.8
              Jan 15, 2025 15:14:54.801273108 CET4970380192.168.2.8199.232.210.172
              Jan 15, 2025 15:14:54.806533098 CET8049703199.232.210.172192.168.2.8
              Jan 15, 2025 15:14:54.806592941 CET4970380192.168.2.8199.232.210.172
              Jan 15, 2025 15:14:54.904867887 CET44549977212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:54.907001019 CET49977445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:54.907001019 CET49977445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:54.907001019 CET49977445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:54.912895918 CET44549977212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:54.912908077 CET44549977212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:55.379458904 CET50050445192.168.2.878.12.175.207
              Jan 15, 2025 15:14:55.386059046 CET4455005078.12.175.207192.168.2.8
              Jan 15, 2025 15:14:55.386158943 CET50050445192.168.2.878.12.175.207
              Jan 15, 2025 15:14:55.386198044 CET50050445192.168.2.878.12.175.207
              Jan 15, 2025 15:14:55.386357069 CET50051445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.395085096 CET4455005178.12.175.1192.168.2.8
              Jan 15, 2025 15:14:55.395097017 CET4455005078.12.175.207192.168.2.8
              Jan 15, 2025 15:14:55.395159006 CET50050445192.168.2.878.12.175.207
              Jan 15, 2025 15:14:55.395164967 CET50051445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.395256042 CET50051445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.395576954 CET50052445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.401165009 CET4455005178.12.175.1192.168.2.8
              Jan 15, 2025 15:14:55.401175022 CET4455005178.12.175.1192.168.2.8
              Jan 15, 2025 15:14:55.401185036 CET4455005278.12.175.1192.168.2.8
              Jan 15, 2025 15:14:55.401326895 CET50051445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.401356936 CET50052445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.401376009 CET50052445192.168.2.878.12.175.1
              Jan 15, 2025 15:14:55.406301022 CET4455005278.12.175.1192.168.2.8
              Jan 15, 2025 15:14:55.987927914 CET50053445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:55.992911100 CET4455005340.138.142.1192.168.2.8
              Jan 15, 2025 15:14:55.992999077 CET50053445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:55.993043900 CET50053445192.168.2.840.138.142.1
              Jan 15, 2025 15:14:55.997826099 CET4455005340.138.142.1192.168.2.8
              Jan 15, 2025 15:14:56.634835958 CET50054445192.168.2.8153.113.213.174
              Jan 15, 2025 15:14:56.639853001 CET44550054153.113.213.174192.168.2.8
              Jan 15, 2025 15:14:56.641066074 CET50054445192.168.2.8153.113.213.174
              Jan 15, 2025 15:14:56.642296076 CET50054445192.168.2.8153.113.213.174
              Jan 15, 2025 15:14:56.642468929 CET50055445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.647171021 CET44550054153.113.213.174192.168.2.8
              Jan 15, 2025 15:14:56.647258997 CET50054445192.168.2.8153.113.213.174
              Jan 15, 2025 15:14:56.647275925 CET44550055153.113.213.1192.168.2.8
              Jan 15, 2025 15:14:56.650054932 CET50055445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.650135994 CET50055445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.654057980 CET50056445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.654968023 CET44550055153.113.213.1192.168.2.8
              Jan 15, 2025 15:14:56.655039072 CET50055445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.659991026 CET44550056153.113.213.1192.168.2.8
              Jan 15, 2025 15:14:56.660890102 CET50056445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.660928011 CET50056445192.168.2.8153.113.213.1
              Jan 15, 2025 15:14:56.666222095 CET44550056153.113.213.1192.168.2.8
              Jan 15, 2025 15:14:56.968162060 CET4455000260.183.236.1192.168.2.8
              Jan 15, 2025 15:14:56.968489885 CET50002445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:56.968590975 CET50002445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:56.968590975 CET50002445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:56.973550081 CET4455000260.183.236.1192.168.2.8
              Jan 15, 2025 15:14:56.973566055 CET4455000260.183.236.1192.168.2.8
              Jan 15, 2025 15:14:57.205928087 CET44550003220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:57.206120014 CET50003445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:57.206120968 CET50003445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:57.206183910 CET50003445192.168.2.8220.126.220.1
              Jan 15, 2025 15:14:57.211103916 CET44550003220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:57.211131096 CET44550003220.126.220.1192.168.2.8
              Jan 15, 2025 15:14:57.269134998 CET50057445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.274159908 CET44550057220.126.220.2192.168.2.8
              Jan 15, 2025 15:14:57.274241924 CET50057445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.274279118 CET50057445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.274612904 CET50058445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.279395103 CET44550057220.126.220.2192.168.2.8
              Jan 15, 2025 15:14:57.279436111 CET44550058220.126.220.2192.168.2.8
              Jan 15, 2025 15:14:57.279448032 CET50057445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.279520035 CET50058445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.279556990 CET50058445192.168.2.8220.126.220.2
              Jan 15, 2025 15:14:57.284395933 CET44550058220.126.220.2192.168.2.8
              Jan 15, 2025 15:14:57.785227060 CET50059445192.168.2.818.165.209.184
              Jan 15, 2025 15:14:57.795191050 CET4455005918.165.209.184192.168.2.8
              Jan 15, 2025 15:14:57.795305014 CET50059445192.168.2.818.165.209.184
              Jan 15, 2025 15:14:57.797629118 CET50059445192.168.2.818.165.209.184
              Jan 15, 2025 15:14:57.797951937 CET50060445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.808175087 CET4455005918.165.209.184192.168.2.8
              Jan 15, 2025 15:14:57.808262110 CET50059445192.168.2.818.165.209.184
              Jan 15, 2025 15:14:57.808655977 CET4455006018.165.209.1192.168.2.8
              Jan 15, 2025 15:14:57.808725119 CET50060445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.808773994 CET50060445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.809138060 CET50061445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.819436073 CET4455006118.165.209.1192.168.2.8
              Jan 15, 2025 15:14:57.819449902 CET4455006018.165.209.1192.168.2.8
              Jan 15, 2025 15:14:57.819509029 CET50060445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.819519043 CET50061445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.819571972 CET50061445192.168.2.818.165.209.1
              Jan 15, 2025 15:14:57.830240011 CET4455006118.165.209.1192.168.2.8
              Jan 15, 2025 15:14:57.909826994 CET50062445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:57.918591976 CET44550062212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:57.918704987 CET50062445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:57.918796062 CET50062445192.168.2.8212.113.42.1
              Jan 15, 2025 15:14:57.927505016 CET44550062212.113.42.1192.168.2.8
              Jan 15, 2025 15:14:58.863213062 CET50063445192.168.2.838.110.111.12
              Jan 15, 2025 15:14:58.868292093 CET4455006338.110.111.12192.168.2.8
              Jan 15, 2025 15:14:58.868417025 CET50063445192.168.2.838.110.111.12
              Jan 15, 2025 15:14:58.868499041 CET50063445192.168.2.838.110.111.12
              Jan 15, 2025 15:14:58.868815899 CET50064445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.873624086 CET4455006438.110.111.1192.168.2.8
              Jan 15, 2025 15:14:58.873712063 CET50064445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.873756886 CET50064445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.873769045 CET4455006338.110.111.12192.168.2.8
              Jan 15, 2025 15:14:58.873833895 CET50063445192.168.2.838.110.111.12
              Jan 15, 2025 15:14:58.875016928 CET50065445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.878988028 CET4455006438.110.111.1192.168.2.8
              Jan 15, 2025 15:14:58.879059076 CET50064445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.879805088 CET4455006538.110.111.1192.168.2.8
              Jan 15, 2025 15:14:58.879929066 CET50065445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.879929066 CET50065445192.168.2.838.110.111.1
              Jan 15, 2025 15:14:58.884689093 CET4455006538.110.111.1192.168.2.8
              Jan 15, 2025 15:14:58.968106985 CET44550007125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:58.968252897 CET50007445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:58.968442917 CET50007445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:58.968503952 CET50007445192.168.2.8125.89.6.1
              Jan 15, 2025 15:14:58.973181009 CET44550007125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:58.973237991 CET44550007125.89.6.1192.168.2.8
              Jan 15, 2025 15:14:59.175935030 CET4455000835.134.115.1192.168.2.8
              Jan 15, 2025 15:14:59.176009893 CET50008445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:59.176166058 CET50008445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:59.176233053 CET50008445192.168.2.835.134.115.1
              Jan 15, 2025 15:14:59.180988073 CET4455000835.134.115.1192.168.2.8
              Jan 15, 2025 15:14:59.181068897 CET4455000835.134.115.1192.168.2.8
              Jan 15, 2025 15:14:59.237983942 CET50066445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.242856026 CET4455006635.134.115.2192.168.2.8
              Jan 15, 2025 15:14:59.242937088 CET50066445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.242985010 CET50066445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.243278027 CET50067445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.247992992 CET4455006635.134.115.2192.168.2.8
              Jan 15, 2025 15:14:59.248049021 CET50066445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.248116970 CET4455006735.134.115.2192.168.2.8
              Jan 15, 2025 15:14:59.248168945 CET50067445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.248191118 CET50067445192.168.2.835.134.115.2
              Jan 15, 2025 15:14:59.253705025 CET4455006735.134.115.2192.168.2.8
              Jan 15, 2025 15:14:59.893064022 CET50068445192.168.2.8144.8.93.82
              Jan 15, 2025 15:14:59.898061037 CET44550068144.8.93.82192.168.2.8
              Jan 15, 2025 15:14:59.898138046 CET50068445192.168.2.8144.8.93.82
              Jan 15, 2025 15:14:59.898262024 CET50068445192.168.2.8144.8.93.82
              Jan 15, 2025 15:14:59.898669004 CET50069445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.903173923 CET44550068144.8.93.82192.168.2.8
              Jan 15, 2025 15:14:59.903243065 CET50068445192.168.2.8144.8.93.82
              Jan 15, 2025 15:14:59.903489113 CET44550069144.8.93.1192.168.2.8
              Jan 15, 2025 15:14:59.903558016 CET50069445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.903628111 CET50069445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.903928995 CET50070445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.908612013 CET44550069144.8.93.1192.168.2.8
              Jan 15, 2025 15:14:59.908675909 CET50069445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.908742905 CET44550070144.8.93.1192.168.2.8
              Jan 15, 2025 15:14:59.908797979 CET50070445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.917870045 CET50070445192.168.2.8144.8.93.1
              Jan 15, 2025 15:14:59.922790051 CET44550070144.8.93.1192.168.2.8
              Jan 15, 2025 15:14:59.972194910 CET50071445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:59.977164030 CET4455007160.183.236.1192.168.2.8
              Jan 15, 2025 15:14:59.977233887 CET50071445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:59.977293015 CET50071445192.168.2.860.183.236.1
              Jan 15, 2025 15:14:59.982209921 CET4455007160.183.236.1192.168.2.8
              Jan 15, 2025 15:15:00.832129002 CET50072445192.168.2.898.103.218.167
              Jan 15, 2025 15:15:00.837069035 CET4455007298.103.218.167192.168.2.8
              Jan 15, 2025 15:15:00.837146997 CET50072445192.168.2.898.103.218.167
              Jan 15, 2025 15:15:00.837243080 CET50072445192.168.2.898.103.218.167
              Jan 15, 2025 15:15:00.837399006 CET50073445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:00.842170000 CET4455007298.103.218.167192.168.2.8
              Jan 15, 2025 15:15:00.842220068 CET50072445192.168.2.898.103.218.167
              Jan 15, 2025 15:15:00.842242002 CET4455007398.103.218.1192.168.2.8
              Jan 15, 2025 15:15:00.842417002 CET50073445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:00.842700005 CET50074445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:00.847371101 CET4455007398.103.218.1192.168.2.8
              Jan 15, 2025 15:15:00.847466946 CET4455007498.103.218.1192.168.2.8
              Jan 15, 2025 15:15:00.847517967 CET50073445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:00.847548962 CET50074445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:00.847587109 CET50074445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:00.852375984 CET4455007498.103.218.1192.168.2.8
              Jan 15, 2025 15:15:01.096112967 CET4455001166.246.170.1192.168.2.8
              Jan 15, 2025 15:15:01.096743107 CET50011445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:01.096849918 CET50011445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:01.096896887 CET50011445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:01.101727962 CET4455001166.246.170.1192.168.2.8
              Jan 15, 2025 15:15:01.101741076 CET4455001166.246.170.1192.168.2.8
              Jan 15, 2025 15:15:01.249850988 CET44550012160.31.57.1192.168.2.8
              Jan 15, 2025 15:15:01.251121998 CET50012445192.168.2.8160.31.57.1
              Jan 15, 2025 15:15:01.251337051 CET50012445192.168.2.8160.31.57.1
              Jan 15, 2025 15:15:01.251337051 CET50012445192.168.2.8160.31.57.1
              Jan 15, 2025 15:15:01.256217957 CET44550012160.31.57.1192.168.2.8
              Jan 15, 2025 15:15:01.256231070 CET44550012160.31.57.1192.168.2.8
              Jan 15, 2025 15:15:01.326225042 CET50075445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.331217051 CET44550075160.31.57.2192.168.2.8
              Jan 15, 2025 15:15:01.331422091 CET50075445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.331443071 CET50075445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.336245060 CET50076445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.336663008 CET44550075160.31.57.2192.168.2.8
              Jan 15, 2025 15:15:01.336740017 CET50075445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.341124058 CET44550076160.31.57.2192.168.2.8
              Jan 15, 2025 15:15:01.341202021 CET50076445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.341244936 CET50076445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:01.346124887 CET44550076160.31.57.2192.168.2.8
              Jan 15, 2025 15:15:01.707114935 CET50078445192.168.2.8131.92.83.97
              Jan 15, 2025 15:15:01.712115049 CET44550078131.92.83.97192.168.2.8
              Jan 15, 2025 15:15:01.712217093 CET50078445192.168.2.8131.92.83.97
              Jan 15, 2025 15:15:01.712389946 CET50078445192.168.2.8131.92.83.97
              Jan 15, 2025 15:15:01.712819099 CET50079445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.717228889 CET44550078131.92.83.97192.168.2.8
              Jan 15, 2025 15:15:01.717323065 CET50078445192.168.2.8131.92.83.97
              Jan 15, 2025 15:15:01.717600107 CET44550079131.92.83.1192.168.2.8
              Jan 15, 2025 15:15:01.717689991 CET50079445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.717776060 CET50079445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.718363047 CET50080445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.722655058 CET44550079131.92.83.1192.168.2.8
              Jan 15, 2025 15:15:01.722726107 CET50079445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.723190069 CET44550080131.92.83.1192.168.2.8
              Jan 15, 2025 15:15:01.723268986 CET50080445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.723326921 CET50080445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:01.728193045 CET44550080131.92.83.1192.168.2.8
              Jan 15, 2025 15:15:01.975709915 CET50081445192.168.2.8125.89.6.1
              Jan 15, 2025 15:15:01.980704069 CET44550081125.89.6.1192.168.2.8
              Jan 15, 2025 15:15:01.980807066 CET50081445192.168.2.8125.89.6.1
              Jan 15, 2025 15:15:01.980850935 CET50081445192.168.2.8125.89.6.1
              Jan 15, 2025 15:15:01.985682964 CET44550081125.89.6.1192.168.2.8
              Jan 15, 2025 15:15:02.589878082 CET50082445192.168.2.856.106.84.171
              Jan 15, 2025 15:15:02.594707012 CET4455008256.106.84.171192.168.2.8
              Jan 15, 2025 15:15:02.594774961 CET50082445192.168.2.856.106.84.171
              Jan 15, 2025 15:15:02.594860077 CET50082445192.168.2.856.106.84.171
              Jan 15, 2025 15:15:02.595000982 CET50083445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.599770069 CET4455008356.106.84.1192.168.2.8
              Jan 15, 2025 15:15:02.599791050 CET4455008256.106.84.171192.168.2.8
              Jan 15, 2025 15:15:02.599828959 CET50083445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.599849939 CET50082445192.168.2.856.106.84.171
              Jan 15, 2025 15:15:02.599929094 CET50083445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.601018906 CET50084445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.604809999 CET4455008356.106.84.1192.168.2.8
              Jan 15, 2025 15:15:02.604876041 CET50083445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.605885983 CET4455008456.106.84.1192.168.2.8
              Jan 15, 2025 15:15:02.605954885 CET50084445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.605997086 CET50084445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:02.610819101 CET4455008456.106.84.1192.168.2.8
              Jan 15, 2025 15:15:02.967371941 CET44550015202.1.124.1192.168.2.8
              Jan 15, 2025 15:15:02.967426062 CET50015445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:02.967487097 CET50015445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:02.967526913 CET50015445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:02.972335100 CET44550015202.1.124.1192.168.2.8
              Jan 15, 2025 15:15:02.972346067 CET44550015202.1.124.1192.168.2.8
              Jan 15, 2025 15:15:03.222923994 CET4455001676.33.192.1192.168.2.8
              Jan 15, 2025 15:15:03.222992897 CET50016445192.168.2.876.33.192.1
              Jan 15, 2025 15:15:03.223026991 CET50016445192.168.2.876.33.192.1
              Jan 15, 2025 15:15:03.223090887 CET50016445192.168.2.876.33.192.1
              Jan 15, 2025 15:15:03.229274988 CET4455001676.33.192.1192.168.2.8
              Jan 15, 2025 15:15:03.229293108 CET4455001676.33.192.1192.168.2.8
              Jan 15, 2025 15:15:03.284787893 CET50085445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.289681911 CET4455008576.33.192.2192.168.2.8
              Jan 15, 2025 15:15:03.291096926 CET50085445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.291110992 CET50085445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.291457891 CET50086445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.296206951 CET4455008576.33.192.2192.168.2.8
              Jan 15, 2025 15:15:03.296236992 CET4455008676.33.192.2192.168.2.8
              Jan 15, 2025 15:15:03.296295881 CET50085445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.296324968 CET50086445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.296360970 CET50086445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:03.301115036 CET4455008676.33.192.2192.168.2.8
              Jan 15, 2025 15:15:03.373990059 CET50087445192.168.2.8206.65.244.128
              Jan 15, 2025 15:15:03.378981113 CET44550087206.65.244.128192.168.2.8
              Jan 15, 2025 15:15:03.381124973 CET50087445192.168.2.8206.65.244.128
              Jan 15, 2025 15:15:03.381167889 CET50087445192.168.2.8206.65.244.128
              Jan 15, 2025 15:15:03.381342888 CET50088445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.386169910 CET44550088206.65.244.1192.168.2.8
              Jan 15, 2025 15:15:03.386205912 CET44550087206.65.244.128192.168.2.8
              Jan 15, 2025 15:15:03.386288881 CET50088445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.386305094 CET50088445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.386686087 CET50087445192.168.2.8206.65.244.128
              Jan 15, 2025 15:15:03.386687040 CET50089445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.391500950 CET44550088206.65.244.1192.168.2.8
              Jan 15, 2025 15:15:03.391539097 CET44550089206.65.244.1192.168.2.8
              Jan 15, 2025 15:15:03.391606092 CET50088445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.391635895 CET50089445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.391669035 CET50089445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:03.396471977 CET44550089206.65.244.1192.168.2.8
              Jan 15, 2025 15:15:04.112962008 CET50091445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:04.118074894 CET4455009166.246.170.1192.168.2.8
              Jan 15, 2025 15:15:04.119110107 CET50091445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:04.121124983 CET50091445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:04.125941038 CET4455009166.246.170.1192.168.2.8
              Jan 15, 2025 15:15:04.983105898 CET4455001937.99.112.1192.168.2.8
              Jan 15, 2025 15:15:04.983197927 CET50019445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:04.983247995 CET50019445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:04.983272076 CET50019445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:04.988177061 CET4455001937.99.112.1192.168.2.8
              Jan 15, 2025 15:15:04.988192081 CET4455001937.99.112.1192.168.2.8
              Jan 15, 2025 15:15:05.191765070 CET44550020181.142.212.1192.168.2.8
              Jan 15, 2025 15:15:05.191863060 CET50020445192.168.2.8181.142.212.1
              Jan 15, 2025 15:15:05.193666935 CET50020445192.168.2.8181.142.212.1
              Jan 15, 2025 15:15:05.193877935 CET50020445192.168.2.8181.142.212.1
              Jan 15, 2025 15:15:05.198421955 CET44550020181.142.212.1192.168.2.8
              Jan 15, 2025 15:15:05.198612928 CET44550020181.142.212.1192.168.2.8
              Jan 15, 2025 15:15:05.263689041 CET50094445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.268613100 CET44550094181.142.212.2192.168.2.8
              Jan 15, 2025 15:15:05.268672943 CET50094445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.271948099 CET50094445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.272290945 CET50095445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.276926041 CET44550094181.142.212.2192.168.2.8
              Jan 15, 2025 15:15:05.276995897 CET50094445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.277071953 CET44550095181.142.212.2192.168.2.8
              Jan 15, 2025 15:15:05.277137041 CET50095445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.277432919 CET50095445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:05.282195091 CET44550095181.142.212.2192.168.2.8
              Jan 15, 2025 15:15:05.972184896 CET50098445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:05.977137089 CET44550098202.1.124.1192.168.2.8
              Jan 15, 2025 15:15:05.977225065 CET50098445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:05.977272987 CET50098445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:05.982116938 CET44550098202.1.124.1192.168.2.8
              Jan 15, 2025 15:15:07.172604084 CET44550024210.164.90.1192.168.2.8
              Jan 15, 2025 15:15:07.172677994 CET50024445192.168.2.8210.164.90.1
              Jan 15, 2025 15:15:07.172744036 CET50024445192.168.2.8210.164.90.1
              Jan 15, 2025 15:15:07.172810078 CET50024445192.168.2.8210.164.90.1
              Jan 15, 2025 15:15:07.177505016 CET44550024210.164.90.1192.168.2.8
              Jan 15, 2025 15:15:07.177526951 CET44550024210.164.90.1192.168.2.8
              Jan 15, 2025 15:15:07.237904072 CET50106445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.244234085 CET44550106210.164.90.2192.168.2.8
              Jan 15, 2025 15:15:07.244317055 CET50106445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.244381905 CET50106445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.244730949 CET50107445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.249438047 CET44550106210.164.90.2192.168.2.8
              Jan 15, 2025 15:15:07.249505043 CET50106445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.249563932 CET44550107210.164.90.2192.168.2.8
              Jan 15, 2025 15:15:07.249758005 CET50107445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.249816895 CET50107445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:07.254570007 CET44550107210.164.90.2192.168.2.8
              Jan 15, 2025 15:15:07.988097906 CET50112445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:07.993165970 CET4455011237.99.112.1192.168.2.8
              Jan 15, 2025 15:15:07.993247986 CET50112445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:07.993295908 CET50112445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:07.998158932 CET4455011237.99.112.1192.168.2.8
              Jan 15, 2025 15:15:09.202539921 CET4455002881.154.25.1192.168.2.8
              Jan 15, 2025 15:15:09.202625036 CET50028445192.168.2.881.154.25.1
              Jan 15, 2025 15:15:09.202665091 CET50028445192.168.2.881.154.25.1
              Jan 15, 2025 15:15:09.202699900 CET50028445192.168.2.881.154.25.1
              Jan 15, 2025 15:15:09.207492113 CET4455002881.154.25.1192.168.2.8
              Jan 15, 2025 15:15:09.207504034 CET4455002881.154.25.1192.168.2.8
              Jan 15, 2025 15:15:09.253684044 CET50125445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.258701086 CET4455012581.154.25.2192.168.2.8
              Jan 15, 2025 15:15:09.258888006 CET50125445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.262278080 CET50125445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.262821913 CET50126445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.267306089 CET4455012581.154.25.2192.168.2.8
              Jan 15, 2025 15:15:09.267374992 CET50125445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.267873049 CET4455012681.154.25.2192.168.2.8
              Jan 15, 2025 15:15:09.267946959 CET50126445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.268013000 CET50126445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:09.273138046 CET4455012681.154.25.2192.168.2.8
              Jan 15, 2025 15:15:10.674372911 CET4455003135.6.2.1192.168.2.8
              Jan 15, 2025 15:15:10.674493074 CET50031445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:10.674539089 CET50031445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:10.674563885 CET50031445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:10.679368973 CET4455003135.6.2.1192.168.2.8
              Jan 15, 2025 15:15:10.679382086 CET4455003135.6.2.1192.168.2.8
              Jan 15, 2025 15:15:11.203573942 CET44550032178.220.235.1192.168.2.8
              Jan 15, 2025 15:15:11.203669071 CET50032445192.168.2.8178.220.235.1
              Jan 15, 2025 15:15:11.204231024 CET50032445192.168.2.8178.220.235.1
              Jan 15, 2025 15:15:11.204271078 CET50032445192.168.2.8178.220.235.1
              Jan 15, 2025 15:15:11.209052086 CET44550032178.220.235.1192.168.2.8
              Jan 15, 2025 15:15:11.209063053 CET44550032178.220.235.1192.168.2.8
              Jan 15, 2025 15:15:11.270514011 CET50155445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.275440931 CET44550155178.220.235.2192.168.2.8
              Jan 15, 2025 15:15:11.275537968 CET50155445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.275599003 CET50155445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.276038885 CET50156445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.280502081 CET44550155178.220.235.2192.168.2.8
              Jan 15, 2025 15:15:11.280567884 CET50155445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.280859947 CET44550156178.220.235.2192.168.2.8
              Jan 15, 2025 15:15:11.280914068 CET50156445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.280946016 CET50156445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:11.285695076 CET44550156178.220.235.2192.168.2.8
              Jan 15, 2025 15:15:12.295625925 CET4455003611.78.48.1192.168.2.8
              Jan 15, 2025 15:15:12.295949936 CET50036445192.168.2.811.78.48.1
              Jan 15, 2025 15:15:12.295950890 CET50036445192.168.2.811.78.48.1
              Jan 15, 2025 15:15:12.295950890 CET50036445192.168.2.811.78.48.1
              Jan 15, 2025 15:15:12.300837040 CET4455003611.78.48.1192.168.2.8
              Jan 15, 2025 15:15:12.300899982 CET4455003611.78.48.1192.168.2.8
              Jan 15, 2025 15:15:13.221393108 CET44550037146.108.83.1192.168.2.8
              Jan 15, 2025 15:15:13.222121000 CET50037445192.168.2.8146.108.83.1
              Jan 15, 2025 15:15:13.222163916 CET50037445192.168.2.8146.108.83.1
              Jan 15, 2025 15:15:13.222209930 CET50037445192.168.2.8146.108.83.1
              Jan 15, 2025 15:15:13.226985931 CET44550037146.108.83.1192.168.2.8
              Jan 15, 2025 15:15:13.226994991 CET44550037146.108.83.1192.168.2.8
              Jan 15, 2025 15:15:13.285069942 CET50205445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.289977074 CET44550205146.108.83.2192.168.2.8
              Jan 15, 2025 15:15:13.290349007 CET50206445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.290404081 CET50205445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.290404081 CET50205445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.295203924 CET44550206146.108.83.2192.168.2.8
              Jan 15, 2025 15:15:13.295278072 CET50206445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.295958996 CET44550205146.108.83.2192.168.2.8
              Jan 15, 2025 15:15:13.295986891 CET50206445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.296214104 CET50205445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:13.300749063 CET44550206146.108.83.2192.168.2.8
              Jan 15, 2025 15:15:13.451884031 CET4455003981.106.104.2192.168.2.8
              Jan 15, 2025 15:15:13.451997042 CET50039445192.168.2.881.106.104.2
              Jan 15, 2025 15:15:13.452106953 CET50039445192.168.2.881.106.104.2
              Jan 15, 2025 15:15:13.452146053 CET50039445192.168.2.881.106.104.2
              Jan 15, 2025 15:15:13.456851006 CET4455003981.106.104.2192.168.2.8
              Jan 15, 2025 15:15:13.456899881 CET4455003981.106.104.2192.168.2.8
              Jan 15, 2025 15:15:13.675245047 CET50220445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:13.680223942 CET4455022035.6.2.1192.168.2.8
              Jan 15, 2025 15:15:13.680412054 CET50220445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:13.680440903 CET50220445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:13.685213089 CET4455022035.6.2.1192.168.2.8
              Jan 15, 2025 15:15:13.826906919 CET44550043200.95.54.1192.168.2.8
              Jan 15, 2025 15:15:13.827027082 CET50043445192.168.2.8200.95.54.1
              Jan 15, 2025 15:15:13.827074051 CET50043445192.168.2.8200.95.54.1
              Jan 15, 2025 15:15:13.827133894 CET50043445192.168.2.8200.95.54.1
              Jan 15, 2025 15:15:13.831896067 CET44550043200.95.54.1192.168.2.8
              Jan 15, 2025 15:15:13.831909895 CET44550043200.95.54.1192.168.2.8
              Jan 15, 2025 15:15:15.299849033 CET4455004666.182.74.2192.168.2.8
              Jan 15, 2025 15:15:15.300043106 CET50046445192.168.2.866.182.74.2
              Jan 15, 2025 15:15:15.300043106 CET50046445192.168.2.866.182.74.2
              Jan 15, 2025 15:15:15.300043106 CET50046445192.168.2.866.182.74.2
              Jan 15, 2025 15:15:15.300431967 CET50337445192.168.2.811.78.48.1
              Jan 15, 2025 15:15:15.301213980 CET4455004538.136.20.1192.168.2.8
              Jan 15, 2025 15:15:15.301331043 CET50045445192.168.2.838.136.20.1
              Jan 15, 2025 15:15:15.301435947 CET50045445192.168.2.838.136.20.1
              Jan 15, 2025 15:15:15.301435947 CET50045445192.168.2.838.136.20.1
              Jan 15, 2025 15:15:15.304894924 CET4455004666.182.74.2192.168.2.8
              Jan 15, 2025 15:15:15.304903984 CET4455004666.182.74.2192.168.2.8
              Jan 15, 2025 15:15:15.305216074 CET4455033711.78.48.1192.168.2.8
              Jan 15, 2025 15:15:15.305274010 CET50337445192.168.2.811.78.48.1
              Jan 15, 2025 15:15:15.305325031 CET50337445192.168.2.811.78.48.1
              Jan 15, 2025 15:15:15.306298018 CET4455004538.136.20.1192.168.2.8
              Jan 15, 2025 15:15:15.306318045 CET4455004538.136.20.1192.168.2.8
              Jan 15, 2025 15:15:15.310086012 CET4455033711.78.48.1192.168.2.8
              Jan 15, 2025 15:15:15.362854958 CET50343445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.367810011 CET4455034338.136.20.2192.168.2.8
              Jan 15, 2025 15:15:15.367886066 CET50343445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.367947102 CET50343445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.368181944 CET50344445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.372996092 CET4455034338.136.20.2192.168.2.8
              Jan 15, 2025 15:15:15.373007059 CET4455034438.136.20.2192.168.2.8
              Jan 15, 2025 15:15:15.373047113 CET50343445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.373070002 CET50344445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.373111963 CET50344445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:15.377919912 CET4455034438.136.20.2192.168.2.8
              Jan 15, 2025 15:15:15.546670914 CET44550049198.38.143.1192.168.2.8
              Jan 15, 2025 15:15:15.546796083 CET50049445192.168.2.8198.38.143.1
              Jan 15, 2025 15:15:16.342607021 CET50061445192.168.2.818.165.209.1
              Jan 15, 2025 15:15:16.342648983 CET50126445192.168.2.881.154.25.2
              Jan 15, 2025 15:15:16.342679977 CET50067445192.168.2.835.134.115.2
              Jan 15, 2025 15:15:16.342737913 CET50076445192.168.2.8160.31.57.2
              Jan 15, 2025 15:15:16.342865944 CET50206445192.168.2.8146.108.83.2
              Jan 15, 2025 15:15:16.342920065 CET50052445192.168.2.878.12.175.1
              Jan 15, 2025 15:15:16.342948914 CET50053445192.168.2.840.138.142.1
              Jan 15, 2025 15:15:16.342961073 CET50049445192.168.2.8198.38.143.1
              Jan 15, 2025 15:15:16.342984915 CET50056445192.168.2.8153.113.213.1
              Jan 15, 2025 15:15:16.343010902 CET50062445192.168.2.8212.113.42.1
              Jan 15, 2025 15:15:16.343012094 CET50058445192.168.2.8220.126.220.2
              Jan 15, 2025 15:15:16.343038082 CET50065445192.168.2.838.110.111.1
              Jan 15, 2025 15:15:16.343075037 CET50070445192.168.2.8144.8.93.1
              Jan 15, 2025 15:15:16.343077898 CET50071445192.168.2.860.183.236.1
              Jan 15, 2025 15:15:16.343107939 CET50074445192.168.2.898.103.218.1
              Jan 15, 2025 15:15:16.343137980 CET50081445192.168.2.8125.89.6.1
              Jan 15, 2025 15:15:16.343141079 CET50080445192.168.2.8131.92.83.1
              Jan 15, 2025 15:15:16.343169928 CET50086445192.168.2.876.33.192.2
              Jan 15, 2025 15:15:16.343195915 CET50084445192.168.2.856.106.84.1
              Jan 15, 2025 15:15:16.343240976 CET50089445192.168.2.8206.65.244.1
              Jan 15, 2025 15:15:16.343277931 CET50091445192.168.2.866.246.170.1
              Jan 15, 2025 15:15:16.343278885 CET50112445192.168.2.837.99.112.1
              Jan 15, 2025 15:15:16.343319893 CET50095445192.168.2.8181.142.212.2
              Jan 15, 2025 15:15:16.343334913 CET50098445192.168.2.8202.1.124.1
              Jan 15, 2025 15:15:16.343379974 CET50107445192.168.2.8210.164.90.2
              Jan 15, 2025 15:15:16.343447924 CET50156445192.168.2.8178.220.235.2
              Jan 15, 2025 15:15:16.343589067 CET50220445192.168.2.835.6.2.1
              Jan 15, 2025 15:15:16.343662024 CET50344445192.168.2.838.136.20.2
              Jan 15, 2025 15:15:16.344280958 CET50337445192.168.2.811.78.48.1
              TimestampSource PortDest PortSource IPDest IP
              Jan 15, 2025 15:14:53.848972082 CET138138192.168.2.8192.168.2.255

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:09:14:09
              Start date:15/01/2025
              Path:C:\Windows\System32\loaddll32.exe
              Wow64 process (32bit):true
              Commandline:loaddll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll"
              Imagebase:0xad0000
              File size:126'464 bytes
              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:09:14:09
              Start date:15/01/2025
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6ee680000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:09:14:09
              Start date:15/01/2025
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1
              Imagebase:0xa40000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:09:14:09
              Start date:15/01/2025
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\zgAMfHzvZN.dll,PlayGame
              Imagebase:0x700000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:09:14:09
              Start date:15/01/2025
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",#1
              Imagebase:0x700000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:09:14:09
              Start date:15/01/2025
              Path:C:\Windows\mssecsvc.exe
              Wow64 process (32bit):true
              Commandline:C:\WINDOWS\mssecsvc.exe
              Imagebase:0x400000
              File size:3'723'264 bytes
              MD5 hash:D21D12114F36CB9CD7AF57659151D441
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1431412188.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1431540630.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1431540630.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
              Reputation:low
              Has exited:true

              Target ID:8
              Start time:09:14:10
              Start date:15/01/2025
              Path:C:\Windows\mssecsvc.exe
              Wow64 process (32bit):true
              Commandline:C:\WINDOWS\mssecsvc.exe -m security
              Imagebase:0x400000
              File size:3'723'264 bytes
              MD5 hash:D21D12114F36CB9CD7AF57659151D441
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1437702648.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1437906578.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1437906578.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2082920782.0000000001B10000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2082920782.0000000001B10000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2083173264.000000000203A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2083173264.000000000203A000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
              Reputation:low
              Has exited:true

              Target ID:9
              Start time:09:14:10
              Start date:15/01/2025
              Path:C:\Windows\tasksche.exe
              Wow64 process (32bit):false
              Commandline:C:\WINDOWS\tasksche.exe /i
              Imagebase:0x400000
              File size:3'514'368 bytes
              MD5 hash:D7F2C9304928C99E1D6856FDF2E75F5F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1442084897.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 98%, ReversingLabs
              • Detection: 93%, Virustotal, Browse
              Reputation:low
              Has exited:true

              Target ID:10
              Start time:09:14:12
              Start date:15/01/2025
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe "C:\Users\user\Desktop\zgAMfHzvZN.dll",PlayGame
              Imagebase:0x700000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:11
              Start time:09:14:12
              Start date:15/01/2025
              Path:C:\Windows\mssecsvc.exe
              Wow64 process (32bit):true
              Commandline:C:\WINDOWS\mssecsvc.exe
              Imagebase:0x400000
              File size:3'723'264 bytes
              MD5 hash:D21D12114F36CB9CD7AF57659151D441
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1464405629.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1460455923.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1464568997.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1464568997.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1460672967.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1460672967.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
              Reputation:low
              Has exited:true

              Target ID:12
              Start time:09:14:13
              Start date:15/01/2025
              Path:C:\Windows\tasksche.exe
              Wow64 process (32bit):false
              Commandline:C:\WINDOWS\tasksche.exe /i
              Imagebase:0x400000
              File size:3'514'368 bytes
              MD5 hash:D7F2C9304928C99E1D6856FDF2E75F5F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1462996462.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1463916151.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:77.5%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:63.2%
                Total number of Nodes:38
                Total number of Limit Nodes:2
                execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 97 407c40 sprintf OpenSCManagerA 91->97 93 407f25 102 407ce0 GetModuleHandleW 93->102 96->90 98 407c74 CreateServiceA 97->98 99 407cca 97->99 100 407cbb CloseServiceHandle 98->100 101 407cad StartServiceA CloseServiceHandle 98->101 99->93 100->93 101->100 103 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 102->103 104 407f08 102->104 103->104 105 407d49 103->105 104->79 105->104 106 407d69 FindResourceA 105->106 106->104 107 407d84 LoadResource 106->107 107->104 108 407d94 LockResource 107->108 108->104 109 407da7 SizeofResource 108->109 109->104 110 407db9 sprintf sprintf MoveFileExA CreateFileA 109->110 110->104 111 407e54 WriteFile CloseHandle CreateProcessA 110->111 111->104 112 407ef2 CloseHandle CloseHandle 111->112 112->104

                Callgraph

                Control-flow Graph

                APIs
                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                • sprintf.MSVCRT ref: 00407E01
                • sprintf.MSVCRT ref: 00407E18
                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                • CreateProcessA.KERNELBASE ref: 00407EE8
                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1443502847.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000006.00000002.1443483239.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443546361.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443766096.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                • API String ID: 4281112323-1507730452
                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                Control-flow Graph

                APIs
                • sprintf.MSVCRT ref: 00407C56
                • OpenSCManagerA.SECHOST(00000000,00000000,000F003F), ref: 00407C68
                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1443502847.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000006.00000002.1443483239.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443546361.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443766096.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                • API String ID: 3340711343-4063779371
                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1443502847.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000006.00000002.1443483239.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443546361.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443766096.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                • String ID:
                • API String ID: 801014965-0
                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                Control-flow Graph

                APIs
                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                Memory Dump Source
                • Source File: 00000006.00000002.1443502847.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000006.00000002.1443483239.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443546361.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443766096.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: Internet$CloseHandleOpen
                • String ID:
                • API String ID: 435140893-0
                • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                Control-flow Graph

                APIs
                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                • __p___argc.MSVCRT ref: 004080A5
                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1443502847.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000006.00000002.1443483239.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443546361.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443584155.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1443766096.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000006.00000002.1444529361.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                • String ID: mssecsvc2.0
                • API String ID: 4274534310-3729025388
                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                Execution Graph

                Execution Coverage:34.8%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:36
                Total number of Limit Nodes:2

                Callgraph

                Control-flow Graph

                APIs
                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                • __p___argc.MSVCRT ref: 004080A5
                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.2082099757.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000008.00000002.2082082188.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082121769.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082192472.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082209421.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                • String ID: mssecsvc2.0
                • API String ID: 4274534310-3729025388
                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                Control-flow Graph

                APIs
                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                Memory Dump Source
                • Source File: 00000008.00000002.2082099757.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000008.00000002.2082082188.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082121769.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082192472.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082209421.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: Internet$CloseHandleOpen
                • String ID:
                • API String ID: 435140893-0
                • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                Control-flow Graph

                APIs
                • sprintf.MSVCRT ref: 00407C56
                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.2082099757.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000008.00000002.2082082188.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082121769.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082192472.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082209421.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                • API String ID: 3340711343-4063779371
                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                APIs
                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                • sprintf.MSVCRT ref: 00407E01
                • sprintf.MSVCRT ref: 00407E18
                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.2082099757.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000008.00000002.2082082188.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082121769.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082192472.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082209421.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                • API String ID: 4072214828-1507730452
                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000008.00000002.2082099757.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000008.00000002.2082082188.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082121769.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082139018.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082174586.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082192472.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082209421.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000008.00000002.2082285812.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                Yara matches
                Similarity
                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                • String ID:
                • API String ID: 801014965-0
                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                APIs
                • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: memcpy
                • String ID: /../$/..\$\../$\..\
                • API String ID: 3510742995-3885502717
                • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                APIs
                • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: AddressProc$LibraryLoad
                • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                • API String ID: 2238633743-2459060434
                • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                APIs
                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandleOpen$ManagerStart
                • String ID: cmd.exe /c "%s"
                • API String ID: 1485051382-955883872
                • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                APIs
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??0exception@@ExceptionThrow$memcpy
                • String ID:
                • API String ID: 1881450474-3916222277
                • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                APIs
                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                • String ID: WANACRY!
                • API String ID: 283026544-1240840912
                • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                APIs
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??0exception@@ExceptionThrowmemcpy
                • String ID: $Q;@
                • API String ID: 2382887404-262343263
                • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                APIs
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??0exception@@ExceptionThrowmemcpy
                • String ID:
                • API String ID: 2382887404-3916222277
                • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                APIs
                • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: Heap$FreeProcessfree
                • String ID:
                • API String ID: 3428986607-0
                • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                APIs
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??0exception@@ExceptionThrow
                • String ID:
                • API String ID: 941485209-0
                • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                APIs
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??0exception@@ExceptionThrow
                • String ID:
                • API String ID: 941485209-0
                • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                APIs
                • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ContextCryptRelease
                • String ID:
                • API String ID: 829835001-0
                • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                APIs
                  • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: AddressProc$LibraryLoad
                • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                • API String ID: 2238633743-1294736154
                • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: %s%s$%s%s%s$:$\
                • API String ID: 0-1100577047
                • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                APIs
                • __p___argv.MSVCRT(0040F538), ref: 00402040
                • strcmp.MSVCRT(?), ref: 0040204B
                • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                  • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                  • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                  • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                  • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                  • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                • API String ID: 1074704982-2844324180
                • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                APIs
                • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                • strlen.MSVCRT(?), ref: 004011A7
                • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                • String ID: 0@$Software\$WanaCrypt0r
                • API String ID: 865909632-3421300005
                • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                APIs
                • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                • String ID: %s\Intel$%s\ProgramData
                • API String ID: 3806094219-198707228
                • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                APIs
                  • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                  • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                • SetLastError.KERNEL32(0000045A), ref: 00402430
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                • API String ID: 1900561814-3657104962
                • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                APIs
                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: Directory$AttributesCreateCurrentFile$swprintf
                • String ID: %s\%s
                • API String ID: 1036847564-4073750446
                • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                APIs
                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                • CloseHandle.KERNEL32(?), ref: 004010EC
                • CloseHandle.KERNEL32(?), ref: 004010F1
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                • String ID: D
                • API String ID: 786732093-2746444292
                • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                APIs
                • __set_app_type.MSVCRT(00000002), ref: 004077E7
                • __p__fmode.MSVCRT ref: 004077FC
                • __p__commode.MSVCRT ref: 0040780A
                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                • String ID:
                • API String ID: 3626615345-0
                • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                APIs
                • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                  • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                • String ID:
                • API String ID: 2141228402-0
                • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                APIs
                • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: Read$realloc
                • String ID: ?!@
                • API String ID: 1241503663-708128716
                • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                APIs
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: rand$wcslen$ComputerNamesrand
                • String ID:
                • API String ID: 3058258771-0
                • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                APIs
                • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                • String ID:
                • API String ID: 2935503933-0
                • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                APIs
                • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                • Sleep.KERNEL32(000003E8), ref: 00401F40
                • CloseHandle.KERNEL32(00000000), ref: 00401F52
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleMutexOpenSleepsprintf
                • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                • API String ID: 2780352083-2959021817
                • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                APIs
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??0exception@@ExceptionThrowmemcpy
                • String ID:
                • API String ID: 2382887404-0
                • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                APIs
                • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                • fclose.MSVCRT(00000000), ref: 00401058
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: fclosefopenfreadfwrite
                • String ID: c.wnry
                • API String ID: 4000964834-3240288721
                • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                APIs
                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                • String ID:
                • API String ID: 2811923685-0
                • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                APIs
                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: File$Pointer$??2@Create
                • String ID:
                • API String ID: 1331958074-0
                • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                APIs
                • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast_stricmp
                • String ID: P!@
                • API String ID: 1278613211-1774101457
                • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                APIs
                • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: AttributesFilestrcmp
                • String ID: c.wnry
                • API String ID: 3324900478-3240288721
                • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                APIs
                • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                Strings
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: ??3@CloseHandle
                • String ID: $l@
                • API String ID: 3816424416-2140230165
                • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                APIs
                • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                Memory Dump Source
                • Source File: 00000009.00000002.1442532095.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000009.00000002.1442475771.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1442658037.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443004889.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000009.00000002.1443028456.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                Yara matches
                Similarity
                • API ID: CriticalSection$Leave$Entermemcpy
                • String ID:
                • API String ID: 3435569088-0
                • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65