Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Qj9gUbJBkY.dll

Overview

General Information

Sample name:Qj9gUbJBkY.dll
renamed because original name is a hash value
Original sample name:50277f214d447d0890c53466fb68af0e.dll
Analysis ID:1591979
MD5:50277f214d447d0890c53466fb68af0e
SHA1:fa1794c45c893ae6c4e1784b93c56ce8283b634b
SHA256:a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 1136 cmdline: loaddll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 4544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2764 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4812 cmdline: rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 404 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 37E83C242780259951E18E4492B93594)
          • tasksche.exe (PID: 3992 cmdline: C:\WINDOWS\tasksche.exe /i MD5: C6E92C6ED2E9E493E490001C4D4C8996)
    • rundll32.exe (PID: 6692 cmdline: rundll32.exe C:\Users\user\Desktop\Qj9gUbJBkY.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7316 cmdline: rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7332 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 37E83C242780259951E18E4492B93594)
        • tasksche.exe (PID: 7384 cmdline: C:\WINDOWS\tasksche.exe /i MD5: C6E92C6ED2E9E493E490001C4D4C8996)
  • mssecsvc.exe (PID: 2060 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 37E83C242780259951E18E4492B93594)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Qj9gUbJBkY.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    Qj9gUbJBkY.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    Qj9gUbJBkY.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      0000000A.00000002.1737514662.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000009.00000002.1738352795.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            6.2.mssecsvc.exe.22838c8.10.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.22838c8.10.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            6.2.mssecsvc.exe.1d5e084.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.1d5e084.7.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            6.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 138 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Qj9gUbJBkY.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 95%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 95%
              Source: Qj9gUbJBkY.dllVirustotal: Detection: 87%Perma Link
              Source: Qj9gUbJBkY.dllReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: Qj9gUbJBkY.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: Qj9gUbJBkY.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: Binary string: ntdll.pdb source: Qj9gUbJBkY.dll, tasksche.exe.5.dr
              Source: Binary string: ntdll.pdb3 source: Qj9gUbJBkY.dll, tasksche.exe.5.dr
              Source: unknownNetwork traffic detected: IP country count 10
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.44
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.44
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.44
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.44
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 50.71.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.184
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.184
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.184
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.184
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 3.168.59.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.182
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.182
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.182
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.182
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.86.41.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.218
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.218
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.218
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.218
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.23.74.1
              Source: unknownTCP traffic detected without corresponding DNS query: 22.87.109.141
              Source: unknownTCP traffic detected without corresponding DNS query: 22.87.109.141
              Source: unknownTCP traffic detected without corresponding DNS query: 22.87.109.141
              Source: unknownTCP traffic detected without corresponding DNS query: 22.87.109.1
              Source: unknownTCP traffic detected without corresponding DNS query: 22.87.109.141
              Source: tasksche.exe.5.drString found in binary or memory: http://eva.vn/phim-hay/buc-anh-he-lo-nguoi-dan-ong-cuoi-cung-cua-van-trong-song-chung-voi-me-chong-g
              Source: tasksche.exe.5.drString found in binary or memory: http://quangcao.24h.com.vn/quangcao/2017/03/test17007_bbthanhmai_tremai_9397.html
              Source: tasksche.exe.5.drString found in binary or memory: http://quangcao.eva.vn/quangcao/2017/03/test17007_bbthanhmai_giamgia50_9396.html
              Source: tasksche.exe.5.drString found in binary or memory: http://st-n.ads3-adnow.com/js/ta.js
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: http://toolbar.conduit.com/Developer/HtmlAndGadget/Methods/JSInjection.aspx
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: http://tpc.googlesyndication.com/
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: http://tpc.googlesyndication.com/Dhttp://tpc.googlesyndication.com/safeframe/1-0-9/html/container.ht
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: http://tpc.googlesyndication.com/safeframe/1-0-9/html/container.html
              Source: tasksche.exe.5.drString found in binary or memory: https://apis.google.com/se/0/_/
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: https://muachung.vn/du-lich/hanh-huong-yen-tu-chua-dong-ba-vang-1-ngay-165493.html?utm_source=admark
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: https://muachung.vn/du-lich/thung-nai-dong-thac-bo-moc-chau-2n1d-89780.html?utm_source=admarket&utm_
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: https://muachung.vn/gia-dung-noi-that/combo-10-vien-tay-bon-cau-176957.html?utm_source=admarket&utm_
              Source: mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drString found in binary or memory: https://muachung.vn/gia-dung-noi-that/combo-3-khan-mat-nhat-100-cotton-34x34cm-175139.html?utm_sourc
              Source: tasksche.exe.5.drString found in binary or memory: https://www.google-analytics.com/plugins/ua/linkid.js
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49672

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
              Source: Yara matchFile source: Qj9gUbJBkY.dll, type: SAMPLE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2292948.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d6d104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.228e8e8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d690a4.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.1738352795.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1706305837.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1708386061.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1734932776.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1708496225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1735042835.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1738503249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1706427283.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2345434328.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2345865127.0000000002292000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 404, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2060, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7332, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: Qj9gUbJBkY.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: Qj9gUbJBkY.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22838c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22838c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1d5e084.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d5e084.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.2292948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2292948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d6d104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d6d104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.228e8e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.228e8e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d690a4.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d690a4.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1737514662.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.1736862867.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.1710343286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1708496225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1735042835.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1738503249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.1706427283.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2345434328.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2345865127.0000000002292000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: Qj9gUbJBkY.dllBinary or memory string: OriginalFilenamentdll.dllj% vs Qj9gUbJBkY.dll
              Source: Qj9gUbJBkY.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: Qj9gUbJBkY.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: Qj9gUbJBkY.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22838c8.10.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22838c8.10.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1d5e084.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d5e084.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22b596c.12.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d90128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1d6d104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d5e084.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.2292948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.22838c8.10.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22b596c.12.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d90128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.2292948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2292948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d6d104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d6d104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.228e8e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.228e8e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d690a4.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d690a4.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1737514662.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.1736862867.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.1710343286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1708496225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1735042835.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1738503249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.1706427283.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2345434328.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2345865127.0000000002292000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000002.1737514662.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@0/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4544:120:WilError_03
              Source: Qj9gUbJBkY.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1
              Source: Qj9gUbJBkY.dllVirustotal: Detection: 87%
              Source: Qj9gUbJBkY.dllReversingLabs: Detection: 94%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Qj9gUbJBkY.dll,PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Qj9gUbJBkY.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: Qj9gUbJBkY.dllStatic file information: File size 5267459 > 1048576
              Source: Qj9gUbJBkY.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: Binary string: ntdll.pdb source: Qj9gUbJBkY.dll, tasksche.exe.5.dr
              Source: Binary string: ntdll.pdb3 source: Qj9gUbJBkY.dll, tasksche.exe.5.dr
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6688Thread sleep count: 97 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6688Thread sleep time: -194000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7068Thread sleep count: 126 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7068Thread sleep count: 40 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6688Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000005.00000002.1712762421.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345065102.0000000000BB8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1739066751.0000000000CDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1591979 Sample: Qj9gUbJBkY.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 4 other signatures 2->56 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        process3 dnsIp4 15 cmd.exe 1 9->15         started        17 rundll32.exe 9->17         started        20 conhost.exe 9->20         started        22 rundll32.exe 1 9->22         started        42 192.168.2.102 unknown unknown 11->42 44 192.168.2.103 unknown unknown 11->44 46 98 other IPs or domains 11->46 68 Connects to many different private IPs via SMB (likely to spread or exploit) 11->68 70 Connects to many different private IPs (likely to spread or exploit) 11->70 signatures5 process6 signatures7 24 rundll32.exe 15->24         started        48 Drops executables to the windows directory (C:\Windows) and starts them 17->48 26 mssecsvc.exe 1 17->26         started        process8 file9 30 mssecsvc.exe 1 24->30         started        38 C:\WINDOWS\qeriuwjhrf (copy), PE32 26->38 dropped 66 Drops executables to the windows directory (C:\Windows) and starts them 26->66 33 tasksche.exe 26->33         started        signatures10 process11 file12 40 C:\Windows\tasksche.exe, PE32 30->40 dropped 35 tasksche.exe 30->35         started        process13 signatures14 58 Detected Wannacry Ransomware 35->58 60 Antivirus detection for dropped file 35->60 62 Multi AV Scanner detection for dropped file 35->62 64 Machine Learning detection for dropped file 35->64

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Qj9gUbJBkY.dll87%VirustotalBrowse
              Qj9gUbJBkY.dll95%ReversingLabsWin32.Ransomware.WannaCry
              Qj9gUbJBkY.dll100%AviraTR/Ransom.Gen
              Qj9gUbJBkY.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)96%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe96%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://muachung.vn/du-lich/hanh-huong-yen-tu-chua-dong-ba-vang-1-ngay-165493.html?utm_source=admark0%Avira URL Cloudsafe
              http://st-n.ads3-adnow.com/js/ta.js0%Avira URL Cloudsafe
              http://quangcao.eva.vn/quangcao/2017/03/test17007_bbthanhmai_giamgia50_9396.html0%Avira URL Cloudsafe
              http://toolbar.conduit.com/Developer/HtmlAndGadget/Methods/JSInjection.aspx0%Avira URL Cloudsafe
              https://muachung.vn/gia-dung-noi-that/combo-10-vien-tay-bon-cau-176957.html?utm_source=admarket&utm_0%Avira URL Cloudsafe
              https://muachung.vn/du-lich/thung-nai-dong-thac-bo-moc-chau-2n1d-89780.html?utm_source=admarket&utm_0%Avira URL Cloudsafe
              https://muachung.vn/gia-dung-noi-that/combo-3-khan-mat-nhat-100-cotton-34x34cm-175139.html?utm_sourc0%Avira URL Cloudsafe
              http://quangcao.24h.com.vn/quangcao/2017/03/test17007_bbthanhmai_tremai_9397.html0%Avira URL Cloudsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://st-n.ads3-adnow.com/js/ta.jstasksche.exe.5.drfalse
              • Avira URL Cloud: safe
              unknown
              https://muachung.vn/du-lich/hanh-huong-yen-tu-chua-dong-ba-vang-1-ngay-165493.html?utm_source=admarkmssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drfalse
              • Avira URL Cloud: safe
              unknown
              https://muachung.vn/du-lich/thung-nai-dong-thac-bo-moc-chau-2n1d-89780.html?utm_source=admarket&utm_mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drfalse
              • Avira URL Cloud: safe
              unknown
              https://muachung.vn/gia-dung-noi-that/combo-3-khan-mat-nhat-100-cotton-34x34cm-175139.html?utm_sourcmssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drfalse
              • Avira URL Cloud: safe
              unknown
              http://quangcao.24h.com.vn/quangcao/2017/03/test17007_bbthanhmai_tremai_9397.htmltasksche.exe.5.drfalse
              • Avira URL Cloud: safe
              unknown
              http://eva.vn/phim-hay/buc-anh-he-lo-nguoi-dan-ong-cuoi-cung-cua-van-trong-song-chung-voi-me-chong-gtasksche.exe.5.drfalse
                high
                http://quangcao.eva.vn/quangcao/2017/03/test17007_bbthanhmai_giamgia50_9396.htmltasksche.exe.5.drfalse
                • Avira URL Cloud: safe
                unknown
                https://apis.google.com/se/0/_/tasksche.exe.5.drfalse
                  high
                  https://muachung.vn/gia-dung-noi-that/combo-10-vien-tay-bon-cau-176957.html?utm_source=admarket&utm_mssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://toolbar.conduit.com/Developer/HtmlAndGadget/Methods/JSInjection.aspxmssecsvc.exe, 00000005.00000000.1706427283.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2345434328.0000000001F92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2345865127.00000000024B8000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000000.1710359056.0000000000602000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000000.1735042835.0000000000912000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000000.1736878705.0000000000602000.00000002.00000001.01000000.00000007.sdmp, Qj9gUbJBkY.dll, tasksche.exe.5.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  28.140.183.155
                  unknownUnited States
                  7922COMCAST-7922USfalse
                  101.133.154.1
                  unknownChina
                  37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                  97.207.201.146
                  unknownUnited States
                  6167CELLCO-PARTUSfalse
                  4.193.63.35
                  unknownUnited States
                  3356LEVEL3USfalse
                  169.190.77.1
                  unknownUnited States
                  37611AfrihostZAfalse
                  169.190.77.2
                  unknownUnited States
                  37611AfrihostZAfalse
                  169.190.77.83
                  unknownUnited States
                  37611AfrihostZAfalse
                  132.231.210.219
                  unknownGermany
                  680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
                  220.42.192.208
                  unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                  106.231.46.31
                  unknownChina
                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                  132.231.210.1
                  unknownGermany
                  680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
                  22.87.109.2
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  22.87.109.1
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  97.207.201.1
                  unknownUnited States
                  6167CELLCO-PARTUSfalse
                  74.172.234.1
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  74.172.234.2
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  216.201.241.48
                  unknownUnited States
                  11215LOGIXCOMM-ASUSfalse
                  92.34.248.1
                  unknownSweden
                  2119TELENOR-NEXTELTelenorNorgeASNOfalse
                  120.105.77.1
                  unknownTaiwan; Republic of China (ROC)
                  17716NTU-TWNationalTaiwanUniversityTWfalse
                  220.42.192.1
                  unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                  8.44.41.1
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  28.140.183.1
                  unknownUnited States
                  7922COMCAST-7922USfalse
                  82.150.4.1
                  unknownEuropean Union
                  5400BTGBfalse
                  4.193.63.1
                  unknownUnited States
                  3356LEVEL3USfalse
                  50.71.224.44
                  unknownCanada
                  6327SHAWCAfalse
                  25.132.166.179
                  unknownUnited Kingdom
                  7922COMCAST-7922USfalse
                  IP
                  192.168.2.148
                  192.168.2.149
                  192.168.2.146
                  192.168.2.147
                  192.168.2.140
                  192.168.2.141
                  192.168.2.144
                  192.168.2.145
                  192.168.2.142
                  192.168.2.143
                  192.168.2.159
                  192.168.2.157
                  192.168.2.158
                  192.168.2.151
                  192.168.2.152
                  192.168.2.150
                  192.168.2.155
                  192.168.2.156
                  192.168.2.153
                  192.168.2.154
                  192.168.2.126
                  192.168.2.247
                  192.168.2.127
                  192.168.2.248
                  192.168.2.124
                  192.168.2.245
                  192.168.2.125
                  192.168.2.246
                  192.168.2.128
                  192.168.2.249
                  192.168.2.129
                  192.168.2.240
                  192.168.2.122
                  192.168.2.243
                  192.168.2.123
                  192.168.2.244
                  192.168.2.120
                  192.168.2.241
                  192.168.2.121
                  192.168.2.242
                  192.168.2.97
                  192.168.2.137
                  192.168.2.96
                  192.168.2.138
                  192.168.2.99
                  192.168.2.135
                  192.168.2.98
                  192.168.2.136
                  192.168.2.139
                  192.168.2.250
                  192.168.2.130
                  192.168.2.251
                  192.168.2.91
                  192.168.2.90
                  192.168.2.93
                  192.168.2.133
                  192.168.2.254
                  192.168.2.92
                  192.168.2.134
                  192.168.2.95
                  192.168.2.131
                  192.168.2.252
                  192.168.2.94
                  192.168.2.132
                  192.168.2.253
                  192.168.2.104
                  192.168.2.225
                  192.168.2.105
                  192.168.2.226
                  192.168.2.102
                  192.168.2.223
                  192.168.2.103
                  192.168.2.224
                  192.168.2.108
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1591979
                  Start date and time:2025-01-15 16:08:16 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 36s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:14
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Qj9gUbJBkY.dll
                  renamed because original name is a hash value
                  Original Sample Name:50277f214d447d0890c53466fb68af0e.dll
                  Detection:MAL
                  Classification:mal100.rans.expl.evad.winDLL@20/2@0/100
                  EGA Information:
                  • Successful, ratio: 66.7%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .dll
                  • Stop behavior analysis, all processes terminated
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 2.22.50.144, 2.23.77.188, 20.109.210.53, 13.107.246.45
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target tasksche.exe, PID 3992 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  10:09:14API Interceptor1x Sleep call for process: loaddll32.exe modified
                  10:09:46API Interceptor112x Sleep call for process: mssecsvc.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdx86_64.elfGet hashmaliciousMiraiBrowse
                  • 182.92.142.6
                  138745635-72645747.116.exeGet hashmaliciousUnknownBrowse
                  • 118.178.60.9
                  mips.elfGet hashmaliciousMiraiBrowse
                  • 47.102.23.59
                  2834573-3676874985.02.exeGet hashmaliciousUnknownBrowse
                  • 118.178.60.9
                  hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                  • 8.157.48.1
                  m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                  • 8.157.50.194
                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                  • 120.76.196.118
                  meth1.elfGet hashmaliciousMiraiBrowse
                  • 120.55.158.191
                  meth4.elfGet hashmaliciousMiraiBrowse
                  • 8.158.74.79
                  i486.elfGet hashmaliciousUnknownBrowse
                  • 8.152.237.14
                  COMCAST-7922USarm4.elfGet hashmaliciousMiraiBrowse
                  • 96.195.149.55
                  xd.mpsl.elfGet hashmaliciousMiraiBrowse
                  • 73.29.200.150
                  x86_64.elfGet hashmaliciousMiraiBrowse
                  • 73.230.252.237
                  mpsl.elfGet hashmaliciousMiraiBrowse
                  • 75.146.53.111
                  mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                  • 76.16.231.119
                  alN48K3xcD.dllGet hashmaliciousWannacryBrowse
                  • 73.32.183.92
                  bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                  • 96.157.153.1
                  178.215.238.129-x86-2025-01-15T04_59_51.elfGet hashmaliciousMiraiBrowse
                  • 96.202.31.29
                  ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                  • 28.93.62.1
                  S8LDvVdtOk.dllGet hashmaliciousWannacryBrowse
                  • 26.242.207.126
                  CELLCO-PARTUSxd.ppc.elfGet hashmaliciousMiraiBrowse
                  • 70.211.87.84
                  arm4.elfGet hashmaliciousMiraiBrowse
                  • 151.146.168.205
                  xd.mpsl.elfGet hashmaliciousMiraiBrowse
                  • 97.227.167.1
                  spc.elfGet hashmaliciousMiraiBrowse
                  • 151.146.168.217
                  bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                  • 97.151.157.92
                  ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                  • 166.146.223.1
                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                  • 97.211.71.186
                  meth8.elfGet hashmaliciousMiraiBrowse
                  • 97.139.119.107
                  arm4.elfGet hashmaliciousUnknownBrowse
                  • 97.206.130.29
                  spc.elfGet hashmaliciousUnknownBrowse
                  • 97.219.217.53
                  No context
                  No context
                  Process:C:\Windows\mssecsvc.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3514368
                  Entropy (8bit):7.226702830156927
                  Encrypted:false
                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SANKx/ag6iVp2Hj:QqPe1Cxcxk3ZA0Yu4Hj
                  MD5:C6E92C6ED2E9E493E490001C4D4C8996
                  SHA1:18F29AC7B184AE98EE1C0F798723B6F48485C4B8
                  SHA-256:D310FD32A780D2978E5F34BD70A309661CCD9A2DF9996357A02A871FF35A131A
                  SHA-512:B45554D0CC5A6B3F5B90185C23752144A6B3F59E0C34DDE6D1F078B25F16362F14F65FA006A9DDEA0C61E5774DFBE4AF68BD128F7120BAE33DF59DAC12865467
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 96%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\mssecsvc.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3514368
                  Entropy (8bit):7.226702830156927
                  Encrypted:false
                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SANKx/ag6iVp2Hj:QqPe1Cxcxk3ZA0Yu4Hj
                  MD5:C6E92C6ED2E9E493E490001C4D4C8996
                  SHA1:18F29AC7B184AE98EE1C0F798723B6F48485C4B8
                  SHA-256:D310FD32A780D2978E5F34BD70A309661CCD9A2DF9996357A02A871FF35A131A
                  SHA-512:B45554D0CC5A6B3F5B90185C23752144A6B3F59E0C34DDE6D1F078B25F16362F14F65FA006A9DDEA0C61E5774DFBE4AF68BD128F7120BAE33DF59DAC12865467
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 96%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.589478776975334
                  TrID:
                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                  • Generic Win/DOS Executable (2004/3) 0.20%
                  • DOS Executable Generic (2002/1) 0.20%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Qj9gUbJBkY.dll
                  File size:5'267'459 bytes
                  MD5:50277f214d447d0890c53466fb68af0e
                  SHA1:fa1794c45c893ae6c4e1784b93c56ce8283b634b
                  SHA256:a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96
                  SHA512:258ee3e29063557e0babc743677dccb56af030ae531e899fbda84dea3fd61a447a1f8a3d36766fd871de35db1c7a63c8d682f0a0ca6be7e334b389cc72e4bb55
                  SSDEEP:98304:M8qPoBhz1aRxcSUDk36SANKx/ag6iVp2H:M8qPe1Cxcxk3ZA0Yu4H
                  TLSH:E236AD42A3F95618F2F63F3059BA16706F7ABC92AD7DC60E1280516E1DB1E40CDB1B63
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                  Icon Hash:7ae282899bbab082
                  Entrypoint:0x100011e9
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x10000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  DLL Characteristics:
                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                  Instruction
                  push ebp
                  mov ebp, esp
                  push ebx
                  mov ebx, dword ptr [ebp+08h]
                  push esi
                  mov esi, dword ptr [ebp+0Ch]
                  push edi
                  mov edi, dword ptr [ebp+10h]
                  test esi, esi
                  jne 00007F922C6A833Bh
                  cmp dword ptr [10003140h], 00000000h
                  jmp 00007F922C6A8358h
                  cmp esi, 01h
                  je 00007F922C6A8337h
                  cmp esi, 02h
                  jne 00007F922C6A8354h
                  mov eax, dword ptr [10003150h]
                  test eax, eax
                  je 00007F922C6A833Bh
                  push edi
                  push esi
                  push ebx
                  call eax
                  test eax, eax
                  je 00007F922C6A833Eh
                  push edi
                  push esi
                  push ebx
                  call 00007F922C6A824Ah
                  test eax, eax
                  jne 00007F922C6A8336h
                  xor eax, eax
                  jmp 00007F922C6A8380h
                  push edi
                  push esi
                  push ebx
                  call 00007F922C6A80FCh
                  cmp esi, 01h
                  mov dword ptr [ebp+0Ch], eax
                  jne 00007F922C6A833Eh
                  test eax, eax
                  jne 00007F922C6A8369h
                  push edi
                  push eax
                  push ebx
                  call 00007F922C6A8226h
                  test esi, esi
                  je 00007F922C6A8337h
                  cmp esi, 03h
                  jne 00007F922C6A8358h
                  push edi
                  push esi
                  push ebx
                  call 00007F922C6A8215h
                  test eax, eax
                  jne 00007F922C6A8335h
                  and dword ptr [ebp+0Ch], eax
                  cmp dword ptr [ebp+0Ch], 00000000h
                  je 00007F922C6A8343h
                  mov eax, dword ptr [10003150h]
                  test eax, eax
                  je 00007F922C6A833Ah
                  push edi
                  push esi
                  push ebx
                  call eax
                  mov dword ptr [ebp+0Ch], eax
                  mov eax, dword ptr [ebp+0Ch]
                  pop edi
                  pop esi
                  pop ebx
                  pop ebp
                  retn 000Ch
                  jmp dword ptr [10002028h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  Programming Language:
                  • [ C ] VS98 (6.0) build 8168
                  • [C++] VS98 (6.0) build 8168
                  • [RES] VS98 (6.0) cvtres build 1720
                  • [LNK] VS98 (6.0) imp/exp build 8168
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x40000x5000600x5010009ab34a8890050739ad0fbcc6f9370479unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  W0x40600x500000dataEnglishUnited States0.8770360946655273
                  DLLImport
                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                  NameOrdinalAddress
                  PlayGame10x10001114
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 15, 2025 16:09:13.465054035 CET49730445192.168.2.450.71.224.44
                  Jan 15, 2025 16:09:13.470551968 CET4454973050.71.224.44192.168.2.4
                  Jan 15, 2025 16:09:13.470649958 CET49730445192.168.2.450.71.224.44
                  Jan 15, 2025 16:09:13.471306086 CET49730445192.168.2.450.71.224.44
                  Jan 15, 2025 16:09:13.471493959 CET49731445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.476109028 CET4454973050.71.224.44192.168.2.4
                  Jan 15, 2025 16:09:13.476157904 CET49730445192.168.2.450.71.224.44
                  Jan 15, 2025 16:09:13.476789951 CET4454973150.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:13.476840973 CET49731445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.476876974 CET49731445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.483243942 CET4454973150.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:13.483297110 CET49731445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.485377073 CET49734445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.490592003 CET4454973450.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:13.490668058 CET49734445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.490976095 CET49734445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:13.495902061 CET4454973450.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:14.522001028 CET49675443192.168.2.4173.222.162.32
                  Jan 15, 2025 16:09:15.460869074 CET49755445192.168.2.43.168.59.184
                  Jan 15, 2025 16:09:15.465771914 CET445497553.168.59.184192.168.2.4
                  Jan 15, 2025 16:09:15.465852976 CET49755445192.168.2.43.168.59.184
                  Jan 15, 2025 16:09:15.465913057 CET49755445192.168.2.43.168.59.184
                  Jan 15, 2025 16:09:15.466198921 CET49756445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.471007109 CET445497553.168.59.184192.168.2.4
                  Jan 15, 2025 16:09:15.471052885 CET445497563.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:15.471087933 CET49755445192.168.2.43.168.59.184
                  Jan 15, 2025 16:09:15.471131086 CET49756445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.471174002 CET49756445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.472340107 CET49757445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.476409912 CET445497563.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:15.476484060 CET49756445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.477212906 CET445497573.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:15.477304935 CET49757445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.477371931 CET49757445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:15.482238054 CET445497573.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:17.500411034 CET49780445192.168.2.423.86.41.182
                  Jan 15, 2025 16:09:17.505269051 CET4454978023.86.41.182192.168.2.4
                  Jan 15, 2025 16:09:17.505347967 CET49780445192.168.2.423.86.41.182
                  Jan 15, 2025 16:09:17.509183884 CET49780445192.168.2.423.86.41.182
                  Jan 15, 2025 16:09:17.509407997 CET49781445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.514210939 CET4454978123.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:17.514307976 CET49781445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.514385939 CET49781445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.514954090 CET4454978023.86.41.182192.168.2.4
                  Jan 15, 2025 16:09:17.515988111 CET4454978023.86.41.182192.168.2.4
                  Jan 15, 2025 16:09:17.516038895 CET49780445192.168.2.423.86.41.182
                  Jan 15, 2025 16:09:17.519629002 CET4454978123.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:17.519685984 CET49781445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.527115107 CET49782445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.531996965 CET4454978223.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:17.532181025 CET49782445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.535784960 CET49782445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:17.540611029 CET4454978223.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:19.508008003 CET49805445192.168.2.4138.23.74.218
                  Jan 15, 2025 16:09:19.512892962 CET44549805138.23.74.218192.168.2.4
                  Jan 15, 2025 16:09:19.512984037 CET49805445192.168.2.4138.23.74.218
                  Jan 15, 2025 16:09:19.513056993 CET49805445192.168.2.4138.23.74.218
                  Jan 15, 2025 16:09:19.513281107 CET49806445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.518171072 CET44549806138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:19.518229961 CET49806445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.518271923 CET49806445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.518687963 CET44549805138.23.74.218192.168.2.4
                  Jan 15, 2025 16:09:19.518739939 CET49805445192.168.2.4138.23.74.218
                  Jan 15, 2025 16:09:19.519545078 CET49807445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.523287058 CET44549806138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:19.523361921 CET49806445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.524682999 CET44549807138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:19.524740934 CET49807445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.524817944 CET49807445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:19.529544115 CET44549807138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:21.523832083 CET49827445192.168.2.422.87.109.141
                  Jan 15, 2025 16:09:21.528997898 CET4454982722.87.109.141192.168.2.4
                  Jan 15, 2025 16:09:21.529170036 CET49827445192.168.2.422.87.109.141
                  Jan 15, 2025 16:09:21.529309034 CET49827445192.168.2.422.87.109.141
                  Jan 15, 2025 16:09:21.529596090 CET49829445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.534634113 CET4454982722.87.109.141192.168.2.4
                  Jan 15, 2025 16:09:21.534765005 CET4454982922.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:21.534776926 CET49827445192.168.2.422.87.109.141
                  Jan 15, 2025 16:09:21.534871101 CET49829445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.534899950 CET49829445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.536407948 CET49830445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.539860964 CET4454982922.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:21.539958000 CET49829445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.541203976 CET4454983022.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:21.541309118 CET49830445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.541424036 CET49830445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:21.546446085 CET4454983022.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:23.538785934 CET49850445192.168.2.474.172.234.40
                  Jan 15, 2025 16:09:23.543981075 CET4454985074.172.234.40192.168.2.4
                  Jan 15, 2025 16:09:23.544179916 CET49850445192.168.2.474.172.234.40
                  Jan 15, 2025 16:09:23.544231892 CET49850445192.168.2.474.172.234.40
                  Jan 15, 2025 16:09:23.544519901 CET49851445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.549460888 CET4454985174.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:23.549602985 CET49851445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.549650908 CET49851445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.549666882 CET4454985074.172.234.40192.168.2.4
                  Jan 15, 2025 16:09:23.549719095 CET49850445192.168.2.474.172.234.40
                  Jan 15, 2025 16:09:23.550766945 CET49852445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.554665089 CET4454985174.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:23.554742098 CET49851445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.557630062 CET4454985274.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:23.557714939 CET49852445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.557789087 CET49852445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:23.562566996 CET4454985274.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:25.556863070 CET49874445192.168.2.4184.91.68.117
                  Jan 15, 2025 16:09:25.561805964 CET44549874184.91.68.117192.168.2.4
                  Jan 15, 2025 16:09:25.561963081 CET49874445192.168.2.4184.91.68.117
                  Jan 15, 2025 16:09:25.562372923 CET49874445192.168.2.4184.91.68.117
                  Jan 15, 2025 16:09:25.562618017 CET49875445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.567230940 CET44549874184.91.68.117192.168.2.4
                  Jan 15, 2025 16:09:25.567327976 CET49874445192.168.2.4184.91.68.117
                  Jan 15, 2025 16:09:25.567564964 CET44549875184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:25.567640066 CET49875445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.567738056 CET49875445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.568114042 CET49876445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.572962999 CET44549876184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:25.572974920 CET44549875184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:25.573091030 CET49875445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.573179007 CET49876445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.573179007 CET49876445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:25.578109980 CET44549876184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:26.378691912 CET49672443192.168.2.4173.222.162.32
                  Jan 15, 2025 16:09:26.378741026 CET44349672173.222.162.32192.168.2.4
                  Jan 15, 2025 16:09:27.569225073 CET49899445192.168.2.452.9.212.54
                  Jan 15, 2025 16:09:27.574084044 CET4454989952.9.212.54192.168.2.4
                  Jan 15, 2025 16:09:27.574574947 CET49899445192.168.2.452.9.212.54
                  Jan 15, 2025 16:09:27.574655056 CET49899445192.168.2.452.9.212.54
                  Jan 15, 2025 16:09:27.574819088 CET49900445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:27.580178022 CET4454990052.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:27.580188990 CET4454989952.9.212.54192.168.2.4
                  Jan 15, 2025 16:09:27.580284119 CET49899445192.168.2.452.9.212.54
                  Jan 15, 2025 16:09:27.580302954 CET49900445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:27.580380917 CET49900445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:27.580754995 CET49901445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:27.586210966 CET4454990152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:27.586348057 CET49901445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:27.586431980 CET49901445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:27.586952925 CET4454990052.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:27.591197014 CET4454990152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:27.596069098 CET4454990052.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:27.598550081 CET49900445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:29.584927082 CET49923445192.168.2.4169.190.77.83
                  Jan 15, 2025 16:09:29.589818001 CET44549923169.190.77.83192.168.2.4
                  Jan 15, 2025 16:09:29.589950085 CET49923445192.168.2.4169.190.77.83
                  Jan 15, 2025 16:09:29.590085983 CET49923445192.168.2.4169.190.77.83
                  Jan 15, 2025 16:09:29.590306997 CET49924445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.594950914 CET44549923169.190.77.83192.168.2.4
                  Jan 15, 2025 16:09:29.595067978 CET49923445192.168.2.4169.190.77.83
                  Jan 15, 2025 16:09:29.595077991 CET44549924169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:29.595145941 CET49924445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.595196962 CET49924445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.595527887 CET49925445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.600080013 CET44549924169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:29.600150108 CET49924445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.600318909 CET44549925169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:29.600404978 CET49925445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.600436926 CET49925445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:29.605151892 CET44549925169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:30.473942995 CET4972380192.168.2.4199.232.210.172
                  Jan 15, 2025 16:09:30.479053974 CET8049723199.232.210.172192.168.2.4
                  Jan 15, 2025 16:09:30.479145050 CET4972380192.168.2.4199.232.210.172
                  Jan 15, 2025 16:09:31.601353884 CET49949445192.168.2.4140.171.161.228
                  Jan 15, 2025 16:09:31.606170893 CET44549949140.171.161.228192.168.2.4
                  Jan 15, 2025 16:09:31.606364012 CET49949445192.168.2.4140.171.161.228
                  Jan 15, 2025 16:09:31.606364012 CET49949445192.168.2.4140.171.161.228
                  Jan 15, 2025 16:09:31.606528044 CET49950445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.611299038 CET44549950140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:31.611357927 CET49950445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.611386061 CET49950445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.611572981 CET44549949140.171.161.228192.168.2.4
                  Jan 15, 2025 16:09:31.611699104 CET49951445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.611814022 CET49949445192.168.2.4140.171.161.228
                  Jan 15, 2025 16:09:31.616389036 CET44549950140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:31.616455078 CET49950445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.616600990 CET44549951140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:31.616652966 CET49951445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.616688967 CET49951445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:31.621551037 CET44549951140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:33.616167068 CET49974445192.168.2.4132.11.156.118
                  Jan 15, 2025 16:09:33.621073008 CET44549974132.11.156.118192.168.2.4
                  Jan 15, 2025 16:09:33.621174097 CET49974445192.168.2.4132.11.156.118
                  Jan 15, 2025 16:09:33.621205091 CET49974445192.168.2.4132.11.156.118
                  Jan 15, 2025 16:09:33.621320009 CET49976445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:33.626578093 CET44549976132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:33.626588106 CET44549974132.11.156.118192.168.2.4
                  Jan 15, 2025 16:09:33.626688004 CET49974445192.168.2.4132.11.156.118
                  Jan 15, 2025 16:09:33.626688004 CET49976445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:33.627010107 CET49977445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:33.631854057 CET44549976132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:33.631913900 CET44549977132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:33.631989002 CET49976445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:33.632010937 CET49977445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:33.632040977 CET49977445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:33.636936903 CET44549977132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:34.858059883 CET4454973450.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:34.858220100 CET49734445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:34.858338118 CET49734445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:34.858428955 CET49734445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:34.863147974 CET4454973450.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:34.863274097 CET4454973450.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:35.655761957 CET49997445192.168.2.4101.133.154.75
                  Jan 15, 2025 16:09:35.660706997 CET44549997101.133.154.75192.168.2.4
                  Jan 15, 2025 16:09:35.660780907 CET49997445192.168.2.4101.133.154.75
                  Jan 15, 2025 16:09:35.660862923 CET49997445192.168.2.4101.133.154.75
                  Jan 15, 2025 16:09:35.661000013 CET49999445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.665803909 CET44549997101.133.154.75192.168.2.4
                  Jan 15, 2025 16:09:35.665815115 CET44549999101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:35.665878057 CET49997445192.168.2.4101.133.154.75
                  Jan 15, 2025 16:09:35.665924072 CET49999445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.669245005 CET49999445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.669506073 CET50000445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.674485922 CET44549999101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:35.674498081 CET44550000101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:35.674559116 CET49999445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.674587011 CET50000445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.674612999 CET50000445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:35.679368019 CET44550000101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:36.864258051 CET445497573.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:36.864415884 CET49757445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:36.864522934 CET49757445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:36.864640951 CET49757445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:36.869344950 CET445497573.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:36.869400978 CET445497573.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:37.647433996 CET50022445192.168.2.482.150.4.218
                  Jan 15, 2025 16:09:37.652441978 CET4455002282.150.4.218192.168.2.4
                  Jan 15, 2025 16:09:37.652520895 CET50022445192.168.2.482.150.4.218
                  Jan 15, 2025 16:09:37.652573109 CET50022445192.168.2.482.150.4.218
                  Jan 15, 2025 16:09:37.652694941 CET50023445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.657557964 CET4455002382.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:37.657653093 CET4455002282.150.4.218192.168.2.4
                  Jan 15, 2025 16:09:37.657691956 CET50023445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.657706976 CET50023445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.657748938 CET50022445192.168.2.482.150.4.218
                  Jan 15, 2025 16:09:37.658118010 CET50024445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.662640095 CET4455002382.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:37.662699938 CET50023445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.662889957 CET4455002482.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:37.662945032 CET50024445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.663017035 CET50024445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:37.667829990 CET4455002482.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:37.866137028 CET50028445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:37.871262074 CET4455002850.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:37.871417046 CET50028445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:37.871562958 CET50028445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:37.876545906 CET4455002850.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:38.936347008 CET4454978223.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:38.936486959 CET49782445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:38.936570883 CET49782445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:38.936664104 CET49782445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:38.941329002 CET4454978223.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:38.941406012 CET4454978223.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:39.663069010 CET50034445192.168.2.4204.171.40.15
                  Jan 15, 2025 16:09:39.667911053 CET44550034204.171.40.15192.168.2.4
                  Jan 15, 2025 16:09:39.668009996 CET50034445192.168.2.4204.171.40.15
                  Jan 15, 2025 16:09:39.668046951 CET50034445192.168.2.4204.171.40.15
                  Jan 15, 2025 16:09:39.668138027 CET50035445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.672941923 CET44550035204.171.40.1192.168.2.4
                  Jan 15, 2025 16:09:39.673033953 CET50035445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.673033953 CET50035445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.673259974 CET50036445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.674066067 CET44550034204.171.40.15192.168.2.4
                  Jan 15, 2025 16:09:39.674135923 CET50034445192.168.2.4204.171.40.15
                  Jan 15, 2025 16:09:39.678031921 CET44550035204.171.40.1192.168.2.4
                  Jan 15, 2025 16:09:39.678092003 CET44550036204.171.40.1192.168.2.4
                  Jan 15, 2025 16:09:39.678215981 CET50035445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.678265095 CET50036445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.678282976 CET50036445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:09:39.683080912 CET44550036204.171.40.1192.168.2.4
                  Jan 15, 2025 16:09:39.866091967 CET50037445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:39.870908976 CET445500373.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:39.871020079 CET50037445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:39.871088982 CET50037445192.168.2.43.168.59.1
                  Jan 15, 2025 16:09:39.876219988 CET445500373.168.59.1192.168.2.4
                  Jan 15, 2025 16:09:40.888495922 CET44549807138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:40.888561010 CET49807445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:40.888622046 CET49807445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:40.888699055 CET49807445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:40.893378973 CET44549807138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:40.893560886 CET44549807138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:41.678744078 CET50038445192.168.2.497.207.201.146
                  Jan 15, 2025 16:09:41.683660030 CET4455003897.207.201.146192.168.2.4
                  Jan 15, 2025 16:09:41.683789968 CET50038445192.168.2.497.207.201.146
                  Jan 15, 2025 16:09:41.683808088 CET50038445192.168.2.497.207.201.146
                  Jan 15, 2025 16:09:41.684056997 CET50039445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.688916922 CET4455003997.207.201.1192.168.2.4
                  Jan 15, 2025 16:09:41.688952923 CET4455003897.207.201.146192.168.2.4
                  Jan 15, 2025 16:09:41.688987970 CET50039445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.689002037 CET50039445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.689014912 CET50038445192.168.2.497.207.201.146
                  Jan 15, 2025 16:09:41.689274073 CET50040445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.694228888 CET4455004097.207.201.1192.168.2.4
                  Jan 15, 2025 16:09:41.694259882 CET4455003997.207.201.1192.168.2.4
                  Jan 15, 2025 16:09:41.694289923 CET50040445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.694314003 CET50039445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.694374084 CET50040445192.168.2.497.207.201.1
                  Jan 15, 2025 16:09:41.699160099 CET4455004097.207.201.1192.168.2.4
                  Jan 15, 2025 16:09:41.944216967 CET50041445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:41.949131966 CET4455004123.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:41.949249029 CET50041445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:41.949369907 CET50041445192.168.2.423.86.41.1
                  Jan 15, 2025 16:09:41.954344034 CET4455004123.86.41.1192.168.2.4
                  Jan 15, 2025 16:09:42.909096003 CET4454983022.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:42.909199953 CET49830445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:42.909359932 CET49830445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:42.909454107 CET49830445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:42.914140940 CET4454983022.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:42.914460897 CET4454983022.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:43.695333004 CET50042445192.168.2.48.44.41.177
                  Jan 15, 2025 16:09:43.700170040 CET445500428.44.41.177192.168.2.4
                  Jan 15, 2025 16:09:43.700455904 CET50042445192.168.2.48.44.41.177
                  Jan 15, 2025 16:09:43.700455904 CET50042445192.168.2.48.44.41.177
                  Jan 15, 2025 16:09:43.700686932 CET50043445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.705483913 CET445500428.44.41.177192.168.2.4
                  Jan 15, 2025 16:09:43.705495119 CET445500438.44.41.1192.168.2.4
                  Jan 15, 2025 16:09:43.705605030 CET50042445192.168.2.48.44.41.177
                  Jan 15, 2025 16:09:43.705626965 CET50043445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.705724001 CET50043445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.706099987 CET50044445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.710836887 CET445500438.44.41.1192.168.2.4
                  Jan 15, 2025 16:09:43.710849047 CET445500448.44.41.1192.168.2.4
                  Jan 15, 2025 16:09:43.711007118 CET50043445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.711041927 CET50044445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.711067915 CET50044445192.168.2.48.44.41.1
                  Jan 15, 2025 16:09:43.715986967 CET445500448.44.41.1192.168.2.4
                  Jan 15, 2025 16:09:43.918873072 CET50045445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:43.924887896 CET44550045138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:43.924973011 CET50045445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:43.925041914 CET50045445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:09:43.931350946 CET44550045138.23.74.1192.168.2.4
                  Jan 15, 2025 16:09:44.919882059 CET4454985274.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:44.920017958 CET49852445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:44.920097113 CET49852445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:44.920247078 CET49852445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:44.926367998 CET4454985274.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:44.926383018 CET4454985274.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:45.709954023 CET50046445192.168.2.4120.105.77.211
                  Jan 15, 2025 16:09:45.714839935 CET44550046120.105.77.211192.168.2.4
                  Jan 15, 2025 16:09:45.714941025 CET50046445192.168.2.4120.105.77.211
                  Jan 15, 2025 16:09:45.714956045 CET50046445192.168.2.4120.105.77.211
                  Jan 15, 2025 16:09:45.715183973 CET50047445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:09:45.719945908 CET44550047120.105.77.1192.168.2.4
                  Jan 15, 2025 16:09:45.719955921 CET44550046120.105.77.211192.168.2.4
                  Jan 15, 2025 16:09:45.720053911 CET50046445192.168.2.4120.105.77.211
                  Jan 15, 2025 16:09:45.720062971 CET50047445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:09:45.720472097 CET50048445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:09:45.725279093 CET44550047120.105.77.1192.168.2.4
                  Jan 15, 2025 16:09:45.725347996 CET50047445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:09:45.726450920 CET44550048120.105.77.1192.168.2.4
                  Jan 15, 2025 16:09:45.726567030 CET50048445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:09:45.726624966 CET50048445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:09:45.731863976 CET44550048120.105.77.1192.168.2.4
                  Jan 15, 2025 16:09:45.912935019 CET50049445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:45.918201923 CET4455004922.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:45.918308020 CET50049445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:45.918353081 CET50049445192.168.2.422.87.109.1
                  Jan 15, 2025 16:09:45.923345089 CET4455004922.87.109.1192.168.2.4
                  Jan 15, 2025 16:09:46.971723080 CET44549876184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:46.971810102 CET49876445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:46.971874952 CET49876445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:46.971920967 CET49876445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:46.977015972 CET44549876184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:46.977027893 CET44549876184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:47.725789070 CET50050445192.168.2.425.132.166.179
                  Jan 15, 2025 16:09:47.730581045 CET4455005025.132.166.179192.168.2.4
                  Jan 15, 2025 16:09:47.730671883 CET50050445192.168.2.425.132.166.179
                  Jan 15, 2025 16:09:47.730720997 CET50050445192.168.2.425.132.166.179
                  Jan 15, 2025 16:09:47.730942011 CET50051445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.736020088 CET4455005125.132.166.1192.168.2.4
                  Jan 15, 2025 16:09:47.736090899 CET50051445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.736180067 CET50051445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.736577034 CET50052445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.738485098 CET4455005025.132.166.179192.168.2.4
                  Jan 15, 2025 16:09:47.738535881 CET50050445192.168.2.425.132.166.179
                  Jan 15, 2025 16:09:47.741535902 CET4455005125.132.166.1192.168.2.4
                  Jan 15, 2025 16:09:47.741553068 CET4455005225.132.166.1192.168.2.4
                  Jan 15, 2025 16:09:47.741592884 CET50051445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.741635084 CET50052445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.741684914 CET50052445192.168.2.425.132.166.1
                  Jan 15, 2025 16:09:47.746521950 CET4455005225.132.166.1192.168.2.4
                  Jan 15, 2025 16:09:47.928769112 CET50053445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:47.933527946 CET4455005374.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:47.933659077 CET50053445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:47.933744907 CET50053445192.168.2.474.172.234.1
                  Jan 15, 2025 16:09:47.938509941 CET4455005374.172.234.1192.168.2.4
                  Jan 15, 2025 16:09:48.968626976 CET4454990152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:48.968733072 CET49901445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:48.968830109 CET49901445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:48.968897104 CET49901445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:48.973593950 CET4454990152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:48.973951101 CET4454990152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:49.600589037 CET50054445192.168.2.428.140.183.155
                  Jan 15, 2025 16:09:49.605724096 CET4455005428.140.183.155192.168.2.4
                  Jan 15, 2025 16:09:49.605823994 CET50054445192.168.2.428.140.183.155
                  Jan 15, 2025 16:09:49.605835915 CET50054445192.168.2.428.140.183.155
                  Jan 15, 2025 16:09:49.605992079 CET50055445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.610816956 CET4455005528.140.183.1192.168.2.4
                  Jan 15, 2025 16:09:49.610876083 CET50055445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.610909939 CET50055445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.610940933 CET4455005428.140.183.155192.168.2.4
                  Jan 15, 2025 16:09:49.610989094 CET50054445192.168.2.428.140.183.155
                  Jan 15, 2025 16:09:49.611165047 CET50056445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.616020918 CET4455005628.140.183.1192.168.2.4
                  Jan 15, 2025 16:09:49.616106033 CET50056445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.616152048 CET50056445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.616261959 CET4455005528.140.183.1192.168.2.4
                  Jan 15, 2025 16:09:49.616314888 CET50055445192.168.2.428.140.183.1
                  Jan 15, 2025 16:09:49.620980024 CET4455005628.140.183.1192.168.2.4
                  Jan 15, 2025 16:09:49.975291967 CET50057445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:49.980081081 CET44550057184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:49.980186939 CET50057445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:49.980433941 CET50057445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:09:49.985215902 CET44550057184.91.68.1192.168.2.4
                  Jan 15, 2025 16:09:50.987371922 CET44549925169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:50.987481117 CET49925445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:50.987531900 CET49925445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:50.987571001 CET49925445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:50.992383003 CET44549925169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:50.992407084 CET44549925169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:51.350910902 CET50058445192.168.2.421.244.7.159
                  Jan 15, 2025 16:09:51.355906963 CET4455005821.244.7.159192.168.2.4
                  Jan 15, 2025 16:09:51.355993986 CET50058445192.168.2.421.244.7.159
                  Jan 15, 2025 16:09:51.356070995 CET50058445192.168.2.421.244.7.159
                  Jan 15, 2025 16:09:51.356265068 CET50059445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.361074924 CET4455005821.244.7.159192.168.2.4
                  Jan 15, 2025 16:09:51.361093998 CET4455005921.244.7.1192.168.2.4
                  Jan 15, 2025 16:09:51.361150026 CET50058445192.168.2.421.244.7.159
                  Jan 15, 2025 16:09:51.361191988 CET50059445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.361284018 CET50059445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.361593008 CET50060445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.366252899 CET4455005921.244.7.1192.168.2.4
                  Jan 15, 2025 16:09:51.366309881 CET50059445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.366465092 CET4455006021.244.7.1192.168.2.4
                  Jan 15, 2025 16:09:51.366518021 CET50060445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.366554022 CET50060445192.168.2.421.244.7.1
                  Jan 15, 2025 16:09:51.371428967 CET4455006021.244.7.1192.168.2.4
                  Jan 15, 2025 16:09:51.975277901 CET50061445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:51.980323076 CET4455006152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:51.983030081 CET50061445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:51.983072996 CET50061445192.168.2.452.9.212.1
                  Jan 15, 2025 16:09:51.987925053 CET4455006152.9.212.1192.168.2.4
                  Jan 15, 2025 16:09:52.991389990 CET50062445192.168.2.436.244.53.64
                  Jan 15, 2025 16:09:52.996514082 CET4455006236.244.53.64192.168.2.4
                  Jan 15, 2025 16:09:52.996609926 CET50062445192.168.2.436.244.53.64
                  Jan 15, 2025 16:09:52.996681929 CET50062445192.168.2.436.244.53.64
                  Jan 15, 2025 16:09:52.996776104 CET50063445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:52.997200966 CET44549951140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:52.997263908 CET49951445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:52.997293949 CET49951445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:52.997317076 CET49951445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:53.001773119 CET4455006336.244.53.1192.168.2.4
                  Jan 15, 2025 16:09:53.001835108 CET50063445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:53.001882076 CET50063445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:53.002082109 CET50064445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:53.002197027 CET4455006236.244.53.64192.168.2.4
                  Jan 15, 2025 16:09:53.002207994 CET44549951140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:53.002217054 CET44549951140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:53.002255917 CET50062445192.168.2.436.244.53.64
                  Jan 15, 2025 16:09:53.006838083 CET4455006336.244.53.1192.168.2.4
                  Jan 15, 2025 16:09:53.006887913 CET50063445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:53.006928921 CET4455006436.244.53.1192.168.2.4
                  Jan 15, 2025 16:09:53.006978035 CET50064445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:53.007026911 CET50064445192.168.2.436.244.53.1
                  Jan 15, 2025 16:09:53.011749029 CET4455006436.244.53.1192.168.2.4
                  Jan 15, 2025 16:09:53.990972042 CET50065445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:53.995883942 CET44550065169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:53.995978117 CET50065445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:53.996000051 CET50065445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:09:54.001266956 CET44550065169.190.77.1192.168.2.4
                  Jan 15, 2025 16:09:54.522737026 CET50066445192.168.2.4113.57.178.142
                  Jan 15, 2025 16:09:54.527779102 CET44550066113.57.178.142192.168.2.4
                  Jan 15, 2025 16:09:54.527939081 CET50066445192.168.2.4113.57.178.142
                  Jan 15, 2025 16:09:54.527939081 CET50066445192.168.2.4113.57.178.142
                  Jan 15, 2025 16:09:54.528074026 CET50067445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.532881975 CET44550067113.57.178.1192.168.2.4
                  Jan 15, 2025 16:09:54.532955885 CET50067445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.533009052 CET50067445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.533016920 CET44550066113.57.178.142192.168.2.4
                  Jan 15, 2025 16:09:54.533240080 CET50066445192.168.2.4113.57.178.142
                  Jan 15, 2025 16:09:54.533240080 CET50068445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.538070917 CET44550068113.57.178.1192.168.2.4
                  Jan 15, 2025 16:09:54.538137913 CET50068445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.538413048 CET44550067113.57.178.1192.168.2.4
                  Jan 15, 2025 16:09:54.538461924 CET50067445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.538794994 CET50068445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:09:54.543662071 CET44550068113.57.178.1192.168.2.4
                  Jan 15, 2025 16:09:54.985976934 CET44549977132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:54.986113071 CET49977445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:54.986232042 CET49977445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:54.986327887 CET49977445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:54.991031885 CET44549977132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:54.991065025 CET44549977132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:55.944426060 CET50069445192.168.2.452.158.118.187
                  Jan 15, 2025 16:09:55.949510098 CET4455006952.158.118.187192.168.2.4
                  Jan 15, 2025 16:09:55.949588060 CET50069445192.168.2.452.158.118.187
                  Jan 15, 2025 16:09:55.949630976 CET50069445192.168.2.452.158.118.187
                  Jan 15, 2025 16:09:55.949857950 CET50070445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.954543114 CET4455006952.158.118.187192.168.2.4
                  Jan 15, 2025 16:09:55.954601049 CET50069445192.168.2.452.158.118.187
                  Jan 15, 2025 16:09:55.954657078 CET4455007052.158.118.1192.168.2.4
                  Jan 15, 2025 16:09:55.954713106 CET50070445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.954739094 CET50070445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.954977036 CET50071445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.959681034 CET4455007052.158.118.1192.168.2.4
                  Jan 15, 2025 16:09:55.959745884 CET50070445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.959820986 CET4455007152.158.118.1192.168.2.4
                  Jan 15, 2025 16:09:55.959871054 CET50071445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.960098028 CET50071445192.168.2.452.158.118.1
                  Jan 15, 2025 16:09:55.964850903 CET4455007152.158.118.1192.168.2.4
                  Jan 15, 2025 16:09:56.006510973 CET50072445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:56.011430979 CET44550072140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:56.011522055 CET50072445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:56.011537075 CET50072445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:09:56.016328096 CET44550072140.171.161.1192.168.2.4
                  Jan 15, 2025 16:09:57.077409029 CET44550000101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:57.077778101 CET50000445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:57.077779055 CET50000445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:57.078921080 CET50000445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:09:57.082622051 CET44550000101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:57.083777905 CET44550000101.133.154.1192.168.2.4
                  Jan 15, 2025 16:09:57.272664070 CET50073445192.168.2.474.55.50.71
                  Jan 15, 2025 16:09:57.277647972 CET4455007374.55.50.71192.168.2.4
                  Jan 15, 2025 16:09:57.277733088 CET50073445192.168.2.474.55.50.71
                  Jan 15, 2025 16:09:57.277786016 CET50073445192.168.2.474.55.50.71
                  Jan 15, 2025 16:09:57.278032064 CET50074445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.282862902 CET4455007374.55.50.71192.168.2.4
                  Jan 15, 2025 16:09:57.282874107 CET4455007474.55.50.1192.168.2.4
                  Jan 15, 2025 16:09:57.282918930 CET50073445192.168.2.474.55.50.71
                  Jan 15, 2025 16:09:57.282968044 CET50074445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.283090115 CET50074445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.283371925 CET50075445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.287959099 CET4455007474.55.50.1192.168.2.4
                  Jan 15, 2025 16:09:57.288019896 CET50074445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.288121939 CET4455007574.55.50.1192.168.2.4
                  Jan 15, 2025 16:09:57.288206100 CET50075445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.288207054 CET50075445192.168.2.474.55.50.1
                  Jan 15, 2025 16:09:57.293018103 CET4455007574.55.50.1192.168.2.4
                  Jan 15, 2025 16:09:57.991029978 CET50076445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:57.995949984 CET44550076132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:57.996062040 CET50076445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:57.996085882 CET50076445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:09:58.001425028 CET44550076132.11.156.1192.168.2.4
                  Jan 15, 2025 16:09:58.522401094 CET50077445192.168.2.43.130.65.251
                  Jan 15, 2025 16:09:58.527363062 CET445500773.130.65.251192.168.2.4
                  Jan 15, 2025 16:09:58.527457952 CET50077445192.168.2.43.130.65.251
                  Jan 15, 2025 16:09:58.527515888 CET50077445192.168.2.43.130.65.251
                  Jan 15, 2025 16:09:58.527703047 CET50078445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.532458067 CET445500773.130.65.251192.168.2.4
                  Jan 15, 2025 16:09:58.532536030 CET50077445192.168.2.43.130.65.251
                  Jan 15, 2025 16:09:58.532612085 CET445500783.130.65.1192.168.2.4
                  Jan 15, 2025 16:09:58.532783985 CET50078445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.532783985 CET50078445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.533023119 CET50079445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.537842035 CET445500793.130.65.1192.168.2.4
                  Jan 15, 2025 16:09:58.537848949 CET445500783.130.65.1192.168.2.4
                  Jan 15, 2025 16:09:58.537914991 CET50079445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.537988901 CET50079445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.538000107 CET50078445192.168.2.43.130.65.1
                  Jan 15, 2025 16:09:58.542804956 CET445500793.130.65.1192.168.2.4
                  Jan 15, 2025 16:09:59.038362026 CET4455002482.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:59.038470984 CET50024445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:59.038522005 CET50024445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:59.038588047 CET50024445192.168.2.482.150.4.1
                  Jan 15, 2025 16:09:59.043342113 CET4455002482.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:59.043349028 CET4455002482.150.4.1192.168.2.4
                  Jan 15, 2025 16:09:59.248297930 CET4455002850.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:59.248502016 CET50028445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:59.248639107 CET50028445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:59.248723030 CET50028445192.168.2.450.71.224.1
                  Jan 15, 2025 16:09:59.253612041 CET4455002850.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:59.253619909 CET4455002850.71.224.1192.168.2.4
                  Jan 15, 2025 16:09:59.303610086 CET50080445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.308554888 CET4455008050.71.224.2192.168.2.4
                  Jan 15, 2025 16:09:59.308712959 CET50080445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.308818102 CET50080445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.309194088 CET50081445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.313803911 CET4455008050.71.224.2192.168.2.4
                  Jan 15, 2025 16:09:59.313905954 CET50080445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.313958883 CET4455008150.71.224.2192.168.2.4
                  Jan 15, 2025 16:09:59.314027071 CET50081445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.314049959 CET50081445192.168.2.450.71.224.2
                  Jan 15, 2025 16:09:59.318829060 CET4455008150.71.224.2192.168.2.4
                  Jan 15, 2025 16:09:59.679323912 CET50082445192.168.2.44.193.63.35
                  Jan 15, 2025 16:09:59.684438944 CET445500824.193.63.35192.168.2.4
                  Jan 15, 2025 16:09:59.684544086 CET50082445192.168.2.44.193.63.35
                  Jan 15, 2025 16:09:59.684544086 CET50082445192.168.2.44.193.63.35
                  Jan 15, 2025 16:09:59.684699059 CET50083445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.689470053 CET445500834.193.63.1192.168.2.4
                  Jan 15, 2025 16:09:59.689539909 CET50083445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.689564943 CET50083445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.689673901 CET445500824.193.63.35192.168.2.4
                  Jan 15, 2025 16:09:59.689717054 CET50082445192.168.2.44.193.63.35
                  Jan 15, 2025 16:09:59.689989090 CET50084445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.694590092 CET445500834.193.63.1192.168.2.4
                  Jan 15, 2025 16:09:59.694659948 CET50083445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.694819927 CET445500844.193.63.1192.168.2.4
                  Jan 15, 2025 16:09:59.694917917 CET50084445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.694917917 CET50084445192.168.2.44.193.63.1
                  Jan 15, 2025 16:09:59.699692011 CET445500844.193.63.1192.168.2.4
                  Jan 15, 2025 16:10:00.084870100 CET50085445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:10:00.089696884 CET44550085101.133.154.1192.168.2.4
                  Jan 15, 2025 16:10:00.089960098 CET50085445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:10:00.090282917 CET50085445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:10:00.095031023 CET44550085101.133.154.1192.168.2.4
                  Jan 15, 2025 16:10:00.756845951 CET50086445192.168.2.4132.231.210.219
                  Jan 15, 2025 16:10:00.761745930 CET44550086132.231.210.219192.168.2.4
                  Jan 15, 2025 16:10:00.761823893 CET50086445192.168.2.4132.231.210.219
                  Jan 15, 2025 16:10:00.761852026 CET50086445192.168.2.4132.231.210.219
                  Jan 15, 2025 16:10:00.761987925 CET50087445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:00.766796112 CET44550087132.231.210.1192.168.2.4
                  Jan 15, 2025 16:10:00.766802073 CET44550086132.231.210.219192.168.2.4
                  Jan 15, 2025 16:10:00.766869068 CET50086445192.168.2.4132.231.210.219
                  Jan 15, 2025 16:10:00.767148018 CET50087445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:00.767149925 CET50088445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:00.771914005 CET44550088132.231.210.1192.168.2.4
                  Jan 15, 2025 16:10:00.772068024 CET44550087132.231.210.1192.168.2.4
                  Jan 15, 2025 16:10:00.772170067 CET50088445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:00.772201061 CET50088445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:00.772216082 CET50087445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:00.777000904 CET44550088132.231.210.1192.168.2.4
                  Jan 15, 2025 16:10:01.044675112 CET44550036204.171.40.1192.168.2.4
                  Jan 15, 2025 16:10:01.044802904 CET50036445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:01.044845104 CET50036445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:01.044902086 CET50036445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:01.050060034 CET44550036204.171.40.1192.168.2.4
                  Jan 15, 2025 16:10:01.050065994 CET44550036204.171.40.1192.168.2.4
                  Jan 15, 2025 16:10:01.231384039 CET445500373.168.59.1192.168.2.4
                  Jan 15, 2025 16:10:01.231462002 CET50037445192.168.2.43.168.59.1
                  Jan 15, 2025 16:10:01.231520891 CET50037445192.168.2.43.168.59.1
                  Jan 15, 2025 16:10:01.231576920 CET50037445192.168.2.43.168.59.1
                  Jan 15, 2025 16:10:01.236378908 CET445500373.168.59.1192.168.2.4
                  Jan 15, 2025 16:10:01.236391068 CET445500373.168.59.1192.168.2.4
                  Jan 15, 2025 16:10:01.289091110 CET50089445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.294295073 CET445500893.168.59.2192.168.2.4
                  Jan 15, 2025 16:10:01.294507027 CET50089445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.294544935 CET50089445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.294882059 CET50090445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.299561024 CET445500893.168.59.2192.168.2.4
                  Jan 15, 2025 16:10:01.299617052 CET50089445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.299670935 CET445500903.168.59.2192.168.2.4
                  Jan 15, 2025 16:10:01.299726963 CET50090445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.299765110 CET50090445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:01.304513931 CET445500903.168.59.2192.168.2.4
                  Jan 15, 2025 16:10:01.772697926 CET50091445192.168.2.4216.201.241.48
                  Jan 15, 2025 16:10:01.777569056 CET44550091216.201.241.48192.168.2.4
                  Jan 15, 2025 16:10:01.777668953 CET50091445192.168.2.4216.201.241.48
                  Jan 15, 2025 16:10:01.777730942 CET50091445192.168.2.4216.201.241.48
                  Jan 15, 2025 16:10:01.777839899 CET50092445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.782650948 CET44550092216.201.241.1192.168.2.4
                  Jan 15, 2025 16:10:01.782725096 CET50092445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.782748938 CET50092445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.782939911 CET44550091216.201.241.48192.168.2.4
                  Jan 15, 2025 16:10:01.782947063 CET50093445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.782998085 CET50091445192.168.2.4216.201.241.48
                  Jan 15, 2025 16:10:01.787731886 CET44550093216.201.241.1192.168.2.4
                  Jan 15, 2025 16:10:01.787956953 CET50093445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.787971973 CET44550092216.201.241.1192.168.2.4
                  Jan 15, 2025 16:10:01.788019896 CET50092445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.788084984 CET50093445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:01.792843103 CET44550093216.201.241.1192.168.2.4
                  Jan 15, 2025 16:10:02.053833961 CET50094445192.168.2.482.150.4.1
                  Jan 15, 2025 16:10:02.058737993 CET4455009482.150.4.1192.168.2.4
                  Jan 15, 2025 16:10:02.058979988 CET50094445192.168.2.482.150.4.1
                  Jan 15, 2025 16:10:02.062323093 CET50094445192.168.2.482.150.4.1
                  Jan 15, 2025 16:10:02.067183018 CET4455009482.150.4.1192.168.2.4
                  Jan 15, 2025 16:10:02.710208893 CET50095445192.168.2.4220.42.192.208
                  Jan 15, 2025 16:10:02.715212107 CET44550095220.42.192.208192.168.2.4
                  Jan 15, 2025 16:10:02.715327024 CET50095445192.168.2.4220.42.192.208
                  Jan 15, 2025 16:10:02.715364933 CET50095445192.168.2.4220.42.192.208
                  Jan 15, 2025 16:10:02.715529919 CET50096445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.720484972 CET44550096220.42.192.1192.168.2.4
                  Jan 15, 2025 16:10:02.720547915 CET50096445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.720562935 CET50096445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.720886946 CET50097445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.721533060 CET44550095220.42.192.208192.168.2.4
                  Jan 15, 2025 16:10:02.721638918 CET50095445192.168.2.4220.42.192.208
                  Jan 15, 2025 16:10:02.725657940 CET44550097220.42.192.1192.168.2.4
                  Jan 15, 2025 16:10:02.725717068 CET50097445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.725737095 CET50097445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.726133108 CET44550096220.42.192.1192.168.2.4
                  Jan 15, 2025 16:10:02.726186037 CET50096445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:02.730494022 CET44550097220.42.192.1192.168.2.4
                  Jan 15, 2025 16:10:03.062361956 CET4455004097.207.201.1192.168.2.4
                  Jan 15, 2025 16:10:03.062555075 CET50040445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:03.062555075 CET50040445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:03.062608957 CET50040445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:03.067698002 CET4455004097.207.201.1192.168.2.4
                  Jan 15, 2025 16:10:03.067723036 CET4455004097.207.201.1192.168.2.4
                  Jan 15, 2025 16:10:03.342039108 CET4455004123.86.41.1192.168.2.4
                  Jan 15, 2025 16:10:03.342164040 CET50041445192.168.2.423.86.41.1
                  Jan 15, 2025 16:10:03.342232943 CET50041445192.168.2.423.86.41.1
                  Jan 15, 2025 16:10:03.342307091 CET50041445192.168.2.423.86.41.1
                  Jan 15, 2025 16:10:03.347057104 CET4455004123.86.41.1192.168.2.4
                  Jan 15, 2025 16:10:03.347109079 CET4455004123.86.41.1192.168.2.4
                  Jan 15, 2025 16:10:03.397257090 CET50098445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.402101040 CET4455009823.86.41.2192.168.2.4
                  Jan 15, 2025 16:10:03.402163029 CET50098445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.402287960 CET50098445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.402484894 CET50099445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.407202005 CET4455009823.86.41.2192.168.2.4
                  Jan 15, 2025 16:10:03.407330036 CET50098445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.407341957 CET4455009923.86.41.2192.168.2.4
                  Jan 15, 2025 16:10:03.407398939 CET50099445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.407430887 CET50099445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:03.412194014 CET4455009923.86.41.2192.168.2.4
                  Jan 15, 2025 16:10:03.585068941 CET50100445192.168.2.441.187.67.162
                  Jan 15, 2025 16:10:03.590023994 CET4455010041.187.67.162192.168.2.4
                  Jan 15, 2025 16:10:03.590101957 CET50100445192.168.2.441.187.67.162
                  Jan 15, 2025 16:10:03.590130091 CET50100445192.168.2.441.187.67.162
                  Jan 15, 2025 16:10:03.590245008 CET50101445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.594990015 CET4455010041.187.67.162192.168.2.4
                  Jan 15, 2025 16:10:03.595086098 CET4455010141.187.67.1192.168.2.4
                  Jan 15, 2025 16:10:03.595134020 CET50101445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.595149040 CET50101445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.595339060 CET4455010041.187.67.162192.168.2.4
                  Jan 15, 2025 16:10:03.595351934 CET50102445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.595382929 CET50100445192.168.2.441.187.67.162
                  Jan 15, 2025 16:10:03.600115061 CET4455010141.187.67.1192.168.2.4
                  Jan 15, 2025 16:10:03.600181103 CET50101445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.600217104 CET4455010241.187.67.1192.168.2.4
                  Jan 15, 2025 16:10:03.600269079 CET50102445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.600294113 CET50102445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:03.605043888 CET4455010241.187.67.1192.168.2.4
                  Jan 15, 2025 16:10:04.053590059 CET50103445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:04.058629990 CET44550103204.171.40.1192.168.2.4
                  Jan 15, 2025 16:10:04.058718920 CET50103445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:04.058763981 CET50103445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:04.063607931 CET44550103204.171.40.1192.168.2.4
                  Jan 15, 2025 16:10:04.413141012 CET50104445192.168.2.4106.231.46.31
                  Jan 15, 2025 16:10:04.418029070 CET44550104106.231.46.31192.168.2.4
                  Jan 15, 2025 16:10:04.419529915 CET50104445192.168.2.4106.231.46.31
                  Jan 15, 2025 16:10:04.419584990 CET50104445192.168.2.4106.231.46.31
                  Jan 15, 2025 16:10:04.419706106 CET50105445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.425605059 CET44550105106.231.46.1192.168.2.4
                  Jan 15, 2025 16:10:04.426984072 CET44550104106.231.46.31192.168.2.4
                  Jan 15, 2025 16:10:04.427051067 CET50105445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.427090883 CET50105445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.427287102 CET50106445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.427962065 CET44550104106.231.46.31192.168.2.4
                  Jan 15, 2025 16:10:04.431550980 CET50104445192.168.2.4106.231.46.31
                  Jan 15, 2025 16:10:04.432046890 CET44550105106.231.46.1192.168.2.4
                  Jan 15, 2025 16:10:04.432096004 CET50105445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.432130098 CET44550106106.231.46.1192.168.2.4
                  Jan 15, 2025 16:10:04.432182074 CET50106445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.432219028 CET50106445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:04.436968088 CET44550106106.231.46.1192.168.2.4
                  Jan 15, 2025 16:10:05.095978975 CET445500448.44.41.1192.168.2.4
                  Jan 15, 2025 16:10:05.096045971 CET50044445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:05.096081018 CET50044445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:05.096127033 CET50044445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:05.100905895 CET445500448.44.41.1192.168.2.4
                  Jan 15, 2025 16:10:05.100917101 CET445500448.44.41.1192.168.2.4
                  Jan 15, 2025 16:10:05.178647041 CET50107445192.168.2.492.34.248.38
                  Jan 15, 2025 16:10:05.183466911 CET4455010792.34.248.38192.168.2.4
                  Jan 15, 2025 16:10:05.183530092 CET50107445192.168.2.492.34.248.38
                  Jan 15, 2025 16:10:05.183567047 CET50107445192.168.2.492.34.248.38
                  Jan 15, 2025 16:10:05.183732033 CET50108445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.188489914 CET4455010892.34.248.1192.168.2.4
                  Jan 15, 2025 16:10:05.188569069 CET50108445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.188569069 CET50108445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.188656092 CET4455010792.34.248.38192.168.2.4
                  Jan 15, 2025 16:10:05.188716888 CET50107445192.168.2.492.34.248.38
                  Jan 15, 2025 16:10:05.188987970 CET50109445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.193478107 CET4455010892.34.248.1192.168.2.4
                  Jan 15, 2025 16:10:05.193552017 CET50108445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.193799973 CET4455010992.34.248.1192.168.2.4
                  Jan 15, 2025 16:10:05.193876982 CET50109445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.193876982 CET50109445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:05.198995113 CET4455010992.34.248.1192.168.2.4
                  Jan 15, 2025 16:10:05.314131021 CET44550045138.23.74.1192.168.2.4
                  Jan 15, 2025 16:10:05.314284086 CET50045445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:10:05.314482927 CET50045445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:10:05.314634085 CET50045445192.168.2.4138.23.74.1
                  Jan 15, 2025 16:10:05.319271088 CET44550045138.23.74.1192.168.2.4
                  Jan 15, 2025 16:10:05.319477081 CET44550045138.23.74.1192.168.2.4
                  Jan 15, 2025 16:10:05.366029978 CET50110445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.370868921 CET44550110138.23.74.2192.168.2.4
                  Jan 15, 2025 16:10:05.371088028 CET50110445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.371150017 CET50110445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.371505976 CET50111445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.376199007 CET44550110138.23.74.2192.168.2.4
                  Jan 15, 2025 16:10:05.376338959 CET44550111138.23.74.2192.168.2.4
                  Jan 15, 2025 16:10:05.376394033 CET50110445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.376451015 CET50111445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.376451015 CET50111445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:05.381289005 CET44550111138.23.74.2192.168.2.4
                  Jan 15, 2025 16:10:06.069101095 CET50113445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:06.073931932 CET4455011397.207.201.1192.168.2.4
                  Jan 15, 2025 16:10:06.074068069 CET50113445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:06.074116945 CET50113445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:06.078896999 CET4455011397.207.201.1192.168.2.4
                  Jan 15, 2025 16:10:07.155497074 CET44550048120.105.77.1192.168.2.4
                  Jan 15, 2025 16:10:07.155567884 CET50048445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:07.155611038 CET50048445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:07.155622005 CET50048445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:07.160506964 CET44550048120.105.77.1192.168.2.4
                  Jan 15, 2025 16:10:07.160517931 CET44550048120.105.77.1192.168.2.4
                  Jan 15, 2025 16:10:07.329781055 CET4455004922.87.109.1192.168.2.4
                  Jan 15, 2025 16:10:07.329838037 CET50049445192.168.2.422.87.109.1
                  Jan 15, 2025 16:10:07.329896927 CET50049445192.168.2.422.87.109.1
                  Jan 15, 2025 16:10:07.329978943 CET50049445192.168.2.422.87.109.1
                  Jan 15, 2025 16:10:07.334729910 CET4455004922.87.109.1192.168.2.4
                  Jan 15, 2025 16:10:07.334739923 CET4455004922.87.109.1192.168.2.4
                  Jan 15, 2025 16:10:07.381777048 CET50119445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.386713028 CET4455011922.87.109.2192.168.2.4
                  Jan 15, 2025 16:10:07.386789083 CET50119445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.386816978 CET50119445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.387185097 CET50120445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.391925097 CET4455012022.87.109.2192.168.2.4
                  Jan 15, 2025 16:10:07.391985893 CET50120445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.392013073 CET50120445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.392055035 CET4455011922.87.109.2192.168.2.4
                  Jan 15, 2025 16:10:07.392102957 CET50119445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:07.396775007 CET4455012022.87.109.2192.168.2.4
                  Jan 15, 2025 16:10:08.100418091 CET50123445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:08.105304003 CET445501238.44.41.1192.168.2.4
                  Jan 15, 2025 16:10:08.105410099 CET50123445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:08.105438948 CET50123445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:08.110301971 CET445501238.44.41.1192.168.2.4
                  Jan 15, 2025 16:10:09.106916904 CET4455005225.132.166.1192.168.2.4
                  Jan 15, 2025 16:10:09.107006073 CET50052445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:09.107095003 CET50052445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:09.107161045 CET50052445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:09.111895084 CET4455005225.132.166.1192.168.2.4
                  Jan 15, 2025 16:10:09.111988068 CET4455005225.132.166.1192.168.2.4
                  Jan 15, 2025 16:10:09.325623035 CET4455005374.172.234.1192.168.2.4
                  Jan 15, 2025 16:10:09.326523066 CET50053445192.168.2.474.172.234.1
                  Jan 15, 2025 16:10:09.326615095 CET50053445192.168.2.474.172.234.1
                  Jan 15, 2025 16:10:09.326659918 CET50053445192.168.2.474.172.234.1
                  Jan 15, 2025 16:10:09.331396103 CET4455005374.172.234.1192.168.2.4
                  Jan 15, 2025 16:10:09.331470966 CET4455005374.172.234.1192.168.2.4
                  Jan 15, 2025 16:10:09.381800890 CET50142445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.386595011 CET4455014274.172.234.2192.168.2.4
                  Jan 15, 2025 16:10:09.386710882 CET50142445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.386712074 CET50142445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.387084961 CET50143445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.391715050 CET4455014274.172.234.2192.168.2.4
                  Jan 15, 2025 16:10:09.391774893 CET50142445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.391860962 CET4455014374.172.234.2192.168.2.4
                  Jan 15, 2025 16:10:09.391976118 CET50143445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.391976118 CET50143445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:09.396764040 CET4455014374.172.234.2192.168.2.4
                  Jan 15, 2025 16:10:10.162796974 CET50155445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:10.167650938 CET44550155120.105.77.1192.168.2.4
                  Jan 15, 2025 16:10:10.167707920 CET50155445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:10.167912960 CET50155445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:10.172780037 CET44550155120.105.77.1192.168.2.4
                  Jan 15, 2025 16:10:10.997704983 CET4455005628.140.183.1192.168.2.4
                  Jan 15, 2025 16:10:10.997778893 CET50056445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:10.997829914 CET50056445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:10.997879028 CET50056445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:11.003051043 CET4455005628.140.183.1192.168.2.4
                  Jan 15, 2025 16:10:11.003103971 CET4455005628.140.183.1192.168.2.4
                  Jan 15, 2025 16:10:11.341465950 CET44550057184.91.68.1192.168.2.4
                  Jan 15, 2025 16:10:11.341573954 CET50057445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:10:11.341622114 CET50057445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:10:11.341660976 CET50057445192.168.2.4184.91.68.1
                  Jan 15, 2025 16:10:11.346489906 CET44550057184.91.68.1192.168.2.4
                  Jan 15, 2025 16:10:11.346518993 CET44550057184.91.68.1192.168.2.4
                  Jan 15, 2025 16:10:11.397156000 CET50179445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.402059078 CET44550179184.91.68.2192.168.2.4
                  Jan 15, 2025 16:10:11.402143002 CET50179445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.402209044 CET50179445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.402467012 CET50180445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.407192945 CET44550179184.91.68.2192.168.2.4
                  Jan 15, 2025 16:10:11.407299995 CET44550180184.91.68.2192.168.2.4
                  Jan 15, 2025 16:10:11.407335997 CET50179445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.407383919 CET50180445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.407407999 CET50180445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:11.412195921 CET44550180184.91.68.2192.168.2.4
                  Jan 15, 2025 16:10:12.115863085 CET50195445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:12.120863914 CET4455019525.132.166.1192.168.2.4
                  Jan 15, 2025 16:10:12.120934963 CET50195445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:12.120963097 CET50195445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:12.125801086 CET4455019525.132.166.1192.168.2.4
                  Jan 15, 2025 16:10:12.735937119 CET4455006021.244.7.1192.168.2.4
                  Jan 15, 2025 16:10:12.739793062 CET50060445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:12.739793062 CET50060445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:12.739825964 CET50060445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:12.744646072 CET4455006021.244.7.1192.168.2.4
                  Jan 15, 2025 16:10:12.744656086 CET4455006021.244.7.1192.168.2.4
                  Jan 15, 2025 16:10:13.341521978 CET4455006152.9.212.1192.168.2.4
                  Jan 15, 2025 16:10:13.341600895 CET50061445192.168.2.452.9.212.1
                  Jan 15, 2025 16:10:13.341655016 CET50061445192.168.2.452.9.212.1
                  Jan 15, 2025 16:10:13.341675997 CET50061445192.168.2.452.9.212.1
                  Jan 15, 2025 16:10:13.346513987 CET4455006152.9.212.1192.168.2.4
                  Jan 15, 2025 16:10:13.346527100 CET4455006152.9.212.1192.168.2.4
                  Jan 15, 2025 16:10:13.397252083 CET50225445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.402138948 CET4455022552.9.212.2192.168.2.4
                  Jan 15, 2025 16:10:13.402213097 CET50225445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.402251005 CET50225445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.402540922 CET50226445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.407294035 CET4455022652.9.212.2192.168.2.4
                  Jan 15, 2025 16:10:13.407365084 CET50226445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.407375097 CET50226445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.407394886 CET4455022552.9.212.2192.168.2.4
                  Jan 15, 2025 16:10:13.407445908 CET50225445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:13.412236929 CET4455022652.9.212.2192.168.2.4
                  Jan 15, 2025 16:10:14.006946087 CET50245445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:14.011787891 CET4455024528.140.183.1192.168.2.4
                  Jan 15, 2025 16:10:14.011920929 CET50245445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:14.012074947 CET50245445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:14.016920090 CET4455024528.140.183.1192.168.2.4
                  Jan 15, 2025 16:10:14.372859955 CET4455006436.244.53.1192.168.2.4
                  Jan 15, 2025 16:10:14.372926950 CET50064445192.168.2.436.244.53.1
                  Jan 15, 2025 16:10:14.372952938 CET50064445192.168.2.436.244.53.1
                  Jan 15, 2025 16:10:14.372988939 CET50064445192.168.2.436.244.53.1
                  Jan 15, 2025 16:10:14.377796888 CET4455006436.244.53.1192.168.2.4
                  Jan 15, 2025 16:10:14.377808094 CET4455006436.244.53.1192.168.2.4
                  Jan 15, 2025 16:10:15.343677998 CET44550065169.190.77.1192.168.2.4
                  Jan 15, 2025 16:10:15.343889952 CET50065445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:10:15.343889952 CET50065445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:10:15.343889952 CET50065445192.168.2.4169.190.77.1
                  Jan 15, 2025 16:10:15.348855972 CET44550065169.190.77.1192.168.2.4
                  Jan 15, 2025 16:10:15.348887920 CET44550065169.190.77.1192.168.2.4
                  Jan 15, 2025 16:10:15.397130013 CET50297445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.401993990 CET44550297169.190.77.2192.168.2.4
                  Jan 15, 2025 16:10:15.402086020 CET50297445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.402146101 CET50297445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.402363062 CET50298445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.407012939 CET44550297169.190.77.2192.168.2.4
                  Jan 15, 2025 16:10:15.407022953 CET44550297169.190.77.2192.168.2.4
                  Jan 15, 2025 16:10:15.407075882 CET50297445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.407104969 CET44550298169.190.77.2192.168.2.4
                  Jan 15, 2025 16:10:15.407171965 CET50298445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.407238960 CET50298445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:15.412039995 CET44550298169.190.77.2192.168.2.4
                  Jan 15, 2025 16:10:15.740906000 CET50315445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:15.745795012 CET4455031521.244.7.1192.168.2.4
                  Jan 15, 2025 16:10:15.745889902 CET50315445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:15.745949030 CET50315445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:15.750709057 CET4455031521.244.7.1192.168.2.4
                  Jan 15, 2025 16:10:15.905755043 CET44550068113.57.178.1192.168.2.4
                  Jan 15, 2025 16:10:15.905834913 CET50068445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:10:15.905909061 CET50068445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:10:15.905909061 CET50068445192.168.2.4113.57.178.1
                  Jan 15, 2025 16:10:15.910764933 CET44550068113.57.178.1192.168.2.4
                  Jan 15, 2025 16:10:15.910775900 CET44550068113.57.178.1192.168.2.4
                  Jan 15, 2025 16:10:17.310384035 CET4455007152.158.118.1192.168.2.4
                  Jan 15, 2025 16:10:17.310538054 CET50071445192.168.2.452.158.118.1
                  Jan 15, 2025 16:10:17.405916929 CET44550072140.171.161.1192.168.2.4
                  Jan 15, 2025 16:10:17.406023979 CET50072445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:10:18.091285944 CET50081445192.168.2.450.71.224.2
                  Jan 15, 2025 16:10:18.091362953 CET50099445192.168.2.423.86.41.2
                  Jan 15, 2025 16:10:18.091378927 CET50143445192.168.2.474.172.234.2
                  Jan 15, 2025 16:10:18.091469049 CET50076445192.168.2.4132.11.156.1
                  Jan 15, 2025 16:10:18.091547966 CET50120445192.168.2.422.87.109.2
                  Jan 15, 2025 16:10:18.091545105 CET50090445192.168.2.43.168.59.2
                  Jan 15, 2025 16:10:18.091607094 CET50072445192.168.2.4140.171.161.1
                  Jan 15, 2025 16:10:18.091619015 CET50111445192.168.2.4138.23.74.2
                  Jan 15, 2025 16:10:18.091666937 CET50071445192.168.2.452.158.118.1
                  Jan 15, 2025 16:10:18.091689110 CET50075445192.168.2.474.55.50.1
                  Jan 15, 2025 16:10:18.091722012 CET50079445192.168.2.43.130.65.1
                  Jan 15, 2025 16:10:18.091767073 CET50084445192.168.2.44.193.63.1
                  Jan 15, 2025 16:10:18.091766119 CET50085445192.168.2.4101.133.154.1
                  Jan 15, 2025 16:10:18.091794014 CET50088445192.168.2.4132.231.210.1
                  Jan 15, 2025 16:10:18.091833115 CET50094445192.168.2.482.150.4.1
                  Jan 15, 2025 16:10:18.091835976 CET50093445192.168.2.4216.201.241.1
                  Jan 15, 2025 16:10:18.091864109 CET50097445192.168.2.4220.42.192.1
                  Jan 15, 2025 16:10:18.091908932 CET50103445192.168.2.4204.171.40.1
                  Jan 15, 2025 16:10:18.091933012 CET50106445192.168.2.4106.231.46.1
                  Jan 15, 2025 16:10:18.091960907 CET50102445192.168.2.441.187.67.1
                  Jan 15, 2025 16:10:18.091984034 CET50109445192.168.2.492.34.248.1
                  Jan 15, 2025 16:10:18.092046976 CET50123445192.168.2.48.44.41.1
                  Jan 15, 2025 16:10:18.092047930 CET50113445192.168.2.497.207.201.1
                  Jan 15, 2025 16:10:18.092047930 CET50195445192.168.2.425.132.166.1
                  Jan 15, 2025 16:10:18.092102051 CET50180445192.168.2.4184.91.68.2
                  Jan 15, 2025 16:10:18.092123985 CET50155445192.168.2.4120.105.77.1
                  Jan 15, 2025 16:10:18.092155933 CET50226445192.168.2.452.9.212.2
                  Jan 15, 2025 16:10:18.092221022 CET50245445192.168.2.428.140.183.1
                  Jan 15, 2025 16:10:18.092238903 CET50315445192.168.2.421.244.7.1
                  Jan 15, 2025 16:10:18.092355967 CET50298445192.168.2.4169.190.77.2
                  Jan 15, 2025 16:10:19.537727118 CET4972480192.168.2.4199.232.210.172
                  Jan 15, 2025 16:10:19.542800903 CET8049724199.232.210.172192.168.2.4
                  Jan 15, 2025 16:10:19.542875051 CET4972480192.168.2.4199.232.210.172
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 15, 2025 16:09:31.107203007 CET138138192.168.2.4192.168.2.255

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:10:09:11
                  Start date:15/01/2025
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll"
                  Imagebase:0xb20000
                  File size:126'464 bytes
                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:10:09:11
                  Start date:15/01/2025
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:10:09:11
                  Start date:15/01/2025
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1
                  Imagebase:0x240000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:10:09:11
                  Start date:15/01/2025
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",#1
                  Imagebase:0x3a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:10:09:11
                  Start date:15/01/2025
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\Qj9gUbJBkY.dll,PlayGame
                  Imagebase:0x3a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:10:09:12
                  Start date:15/01/2025
                  Path:C:\Windows\mssecsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\WINDOWS\mssecsvc.exe
                  Imagebase:0x400000
                  File size:3'723'264 bytes
                  MD5 hash:37E83C242780259951E18E4492B93594
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1706305837.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1706427283.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1706427283.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Target ID:6
                  Start time:10:09:12
                  Start date:15/01/2025
                  Path:C:\Windows\mssecsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\WINDOWS\mssecsvc.exe -m security
                  Imagebase:0x400000
                  File size:3'723'264 bytes
                  MD5 hash:37E83C242780259951E18E4492B93594
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1708386061.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1708496225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1708496225.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2345434328.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2345434328.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2345865127.0000000002292000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2345865127.0000000002292000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Target ID:7
                  Start time:10:09:12
                  Start date:15/01/2025
                  Path:C:\Windows\tasksche.exe
                  Wow64 process (32bit):false
                  Commandline:C:\WINDOWS\tasksche.exe /i
                  Imagebase:0x400000
                  File size:3'514'368 bytes
                  MD5 hash:C6E92C6ED2E9E493E490001C4D4C8996
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1710343286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 96%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:10:09:14
                  Start date:15/01/2025
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Qj9gUbJBkY.dll",PlayGame
                  Imagebase:0x3a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:9
                  Start time:10:09:14
                  Start date:15/01/2025
                  Path:C:\Windows\mssecsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\WINDOWS\mssecsvc.exe
                  Imagebase:0x400000
                  File size:3'723'264 bytes
                  MD5 hash:37E83C242780259951E18E4492B93594
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1738352795.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1734932776.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1735042835.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1735042835.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1738503249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1738503249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Target ID:10
                  Start time:10:09:15
                  Start date:15/01/2025
                  Path:C:\Windows\tasksche.exe
                  Wow64 process (32bit):false
                  Commandline:C:\WINDOWS\tasksche.exe /i
                  Imagebase:0x400000
                  File size:3'514'368 bytes
                  MD5 hash:C6E92C6ED2E9E493E490001C4D4C8996
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1737514662.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1736862867.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                  Reputation:low
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:76.6%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:60%
                    Total number of Nodes:40
                    Total number of Limit Nodes:2
                    execution_graph 64 409a16 __set_app_type __p__fmode __p__commode 65 409a85 64->65 66 409a99 65->66 67 409a8d __setusermatherr 65->67 76 409b8c _controlfp 66->76 67->66 69 409a9e _initterm __getmainargs _initterm 70 409af2 GetStartupInfoA 69->70 72 409b26 GetModuleHandleA 70->72 77 408140 InternetOpenA InternetOpenUrlA 72->77 75 409b4a exit _XcptFilter 76->69 78 4081a7 InternetCloseHandle InternetCloseHandle 77->78 79 4081bc InternetCloseHandle InternetCloseHandle 77->79 82 408090 GetModuleFileNameA __p___argc 78->82 79->75 81 4081b2 81->75 83 4080b0 82->83 84 4080b9 OpenSCManagerA 82->84 93 407f20 83->93 85 408101 StartServiceCtrlDispatcherA 84->85 86 4080cf OpenServiceA 84->86 85->81 88 4080fc CloseServiceHandle 86->88 89 4080ee 86->89 88->85 98 407fa0 ChangeServiceConfig2A 89->98 92 4080f6 CloseServiceHandle 92->88 99 407c40 sprintf OpenSCManagerA 93->99 95 407f25 104 407ce0 GetModuleHandleW 95->104 98->92 100 407c74 CreateServiceA 99->100 101 407cca 99->101 102 407cbb CloseServiceHandle 100->102 103 407cad StartServiceA CloseServiceHandle 100->103 101->95 102->95 103->102 105 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 104->105 106 407f08 104->106 105->106 107 407d49 105->107 106->81 107->106 108 407d69 FindResourceA 107->108 108->106 109 407d84 LoadResource 108->109 109->106 110 407d94 LockResource 109->110 110->106 111 407da7 SizeofResource 110->111 111->106 112 407db9 sprintf sprintf MoveFileExA CreateFileA 111->112 112->106 113 407e54 WriteFile CloseHandle CreateProcessA 112->113 113->106 114 407ef2 CloseHandle CloseHandle 113->114 114->106

                    Callgraph

                    Control-flow Graph

                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                    • sprintf.MSVCRT ref: 00407E01
                    • sprintf.MSVCRT ref: 00407E18
                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                    • CreateProcessA.KERNELBASE ref: 00407EE8
                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.1711900844.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.1711849066.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711915921.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711974018.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                    • API String ID: 4281112323-1507730452
                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                    Control-flow Graph

                    APIs
                    • sprintf.MSVCRT ref: 00407C56
                    • OpenSCManagerA.SECHOST(00000000,00000000,000F003F), ref: 00407C68
                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.1711900844.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.1711849066.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711915921.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711974018.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                    • API String ID: 3340711343-4063779371
                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000005.00000002.1711900844.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.1711849066.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711915921.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711974018.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                    • String ID:
                    • API String ID: 801014965-0
                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                    Control-flow Graph

                    APIs
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                    • InternetCloseHandle.WININET(00000000), ref: 004081BC
                    • InternetCloseHandle.WININET(00000000), ref: 004081BF
                    Memory Dump Source
                    • Source File: 00000005.00000002.1711900844.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.1711849066.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711915921.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711974018.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandle$Open$FileModuleName__p___argc
                    • String ID:
                    • API String ID: 2010709392-0
                    • Opcode ID: ec133b43de4331460eff2a0b2c8cd404513b79e1c5a5deea9d12a904249ad51c
                    • Instruction ID: e18cae5e57e59901b1837d80ae8654563a660de2be6bc36b6f573cb3739cdf66
                    • Opcode Fuzzy Hash: ec133b43de4331460eff2a0b2c8cd404513b79e1c5a5deea9d12a904249ad51c
                    • Instruction Fuzzy Hash: AB0175719043206EE310EF749C01BAF7BE9EF85750F01042FF984E6280EAB5981487A7

                    Control-flow Graph

                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                    • __p___argc.MSVCRT ref: 004080A5
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.1711900844.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.1711849066.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711915921.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711930922.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1711974018.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000005.00000002.1712091122.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                    • String ID: mssecsvc2.0
                    • API String ID: 4274534310-3729025388
                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                    Execution Graph

                    Execution Coverage:35%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:38
                    Total number of Limit Nodes:2

                    Callgraph

                    Control-flow Graph

                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                    • __p___argc.MSVCRT ref: 004080A5
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2344366028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.2344352634.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344380832.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344445227.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344459259.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                    • String ID: mssecsvc2.0
                    • API String ID: 4274534310-3729025388
                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                    Control-flow Graph

                    APIs
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                    • InternetCloseHandle.WININET(00000000), ref: 004081BC
                    • InternetCloseHandle.WININET(00000000), ref: 004081BF
                    Memory Dump Source
                    • Source File: 00000006.00000002.2344366028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.2344352634.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344380832.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344445227.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344459259.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandle$Open$FileModuleName__p___argc
                    • String ID:
                    • API String ID: 2010709392-0
                    • Opcode ID: ec133b43de4331460eff2a0b2c8cd404513b79e1c5a5deea9d12a904249ad51c
                    • Instruction ID: e18cae5e57e59901b1837d80ae8654563a660de2be6bc36b6f573cb3739cdf66
                    • Opcode Fuzzy Hash: ec133b43de4331460eff2a0b2c8cd404513b79e1c5a5deea9d12a904249ad51c
                    • Instruction Fuzzy Hash: AB0175719043206EE310EF749C01BAF7BE9EF85750F01042FF984E6280EAB5981487A7

                    Control-flow Graph

                    APIs
                    • sprintf.MSVCRT ref: 00407C56
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2344366028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.2344352634.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344380832.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344445227.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344459259.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                    • API String ID: 3340711343-4063779371
                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 16 407ce0-407cfb GetModuleHandleW 17 407d01-407d43 GetProcAddress * 4 16->17 18 407f08-407f14 16->18 17->18 19 407d49-407d4f 17->19 19->18 20 407d55-407d5b 19->20 20->18 21 407d61-407d63 20->21 21->18 22 407d69-407d7e FindResourceA 21->22 22->18 23 407d84-407d8e LoadResource 22->23 23->18 24 407d94-407da1 LockResource 23->24 24->18 25 407da7-407db3 SizeofResource 24->25 25->18 26 407db9-407e4e sprintf * 2 MoveFileExA 25->26 26->18 28 407e54-407ef0 26->28 28->18 32 407ef2-407f01 28->32 32->18
                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                    • sprintf.MSVCRT ref: 00407E01
                    • sprintf.MSVCRT ref: 00407E18
                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2344366028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.2344352634.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344380832.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344445227.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344459259.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                    • API String ID: 4072214828-1507730452
                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.2344366028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000006.00000002.2344352634.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344380832.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344395492.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344430774.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344445227.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344459259.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090D000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.000000000090F000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000912000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009E7000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.00000000009FF000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000006.00000002.2344544459.0000000000A03000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                    • String ID:
                    • API String ID: 801014965-0
                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                    APIs
                    • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: memcpy
                    • String ID: /../$/..\$\../$\..\
                    • API String ID: 3510742995-3885502717
                    • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                    • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                    • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                    • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                    APIs
                    • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                    • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                    • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                    • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                    • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                    • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                    • API String ID: 2238633743-2459060434
                    • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                    • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                    • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                    • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                    APIs
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                    • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandleOpen$ManagerStart
                    • String ID: cmd.exe /c "%s"
                    • API String ID: 1485051382-955883872
                    • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                    • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                    • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                    • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                    • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                    • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrow$memcpy
                    • String ID:
                    • API String ID: 1881450474-3916222277
                    • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                    • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                    • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                    • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                    APIs
                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                    • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                    • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                    • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                    • String ID: WANACRY!
                    • API String ID: 283026544-1240840912
                    • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                    • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                    • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                    • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrowmemcpy
                    • String ID: $Q;@
                    • API String ID: 2382887404-262343263
                    • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                    • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                    • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                    • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrowmemcpy
                    • String ID:
                    • API String ID: 2382887404-3916222277
                    • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                    • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                    • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                    • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                    APIs
                    • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeProcessfree
                    • String ID:
                    • API String ID: 3428986607-0
                    • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                    • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                    • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                    • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrow
                    • String ID:
                    • API String ID: 941485209-0
                    • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                    • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                    • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                    • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrow
                    • String ID:
                    • API String ID: 941485209-0
                    • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                    • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                    • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                    • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: memcpy
                    • String ID:
                    • API String ID: 3510742995-0
                    • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                    • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                    • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                    • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                    APIs
                    • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ContextCryptRelease
                    • String ID:
                    • API String ID: 829835001-0
                    • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                    • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                    • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                    • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                    • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                    • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                    • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                    • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                    • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                    • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                    APIs
                      • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                    • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                    • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                    • API String ID: 2238633743-1294736154
                    • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                    • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                    • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                    • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: %s%s$%s%s%s$:$\
                    • API String ID: 0-1100577047
                    • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                    • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                    • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                    • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                    APIs
                    • __p___argv.MSVCRT(0040F538), ref: 00402040
                    • strcmp.MSVCRT(?), ref: 0040204B
                    • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                    • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                      • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                    • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                    • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                    • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                      • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                      • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                      • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                      • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                    • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                    • API String ID: 1074704982-2844324180
                    • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                    • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                    • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                    • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                    APIs
                    • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                    • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                    • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                    • strlen.MSVCRT(?), ref: 004011A7
                    • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                    • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                    • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                    • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                    • String ID: 0@$Software\$WanaCrypt0r
                    • API String ID: 865909632-3421300005
                    • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                    • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                    • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                    • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                    • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                    • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                    • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                    • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                    • String ID: %s\Intel$%s\ProgramData
                    • API String ID: 3806094219-198707228
                    • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                    • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                    • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                    • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                    APIs
                      • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                    • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                    • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                    • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                      • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                    • SetLastError.KERNEL32(0000045A), ref: 00402430
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                    • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                    • API String ID: 1900561814-3657104962
                    • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                    • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                    • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                    • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                    APIs
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                    • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                    • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Directory$AttributesCreateCurrentFile$swprintf
                    • String ID: %s\%s
                    • API String ID: 1036847564-4073750446
                    • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                    • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                    • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                    • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                    APIs
                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                    • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                    • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                    • CloseHandle.KERNEL32(?), ref: 004010EC
                    • CloseHandle.KERNEL32(?), ref: 004010F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                    • String ID: D
                    • API String ID: 786732093-2746444292
                    • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                    • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                    • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                    • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                    APIs
                    • __set_app_type.MSVCRT(00000002), ref: 004077E7
                    • __p__fmode.MSVCRT ref: 004077FC
                    • __p__commode.MSVCRT ref: 0040780A
                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                    • String ID:
                    • API String ID: 3626615345-0
                    • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                    • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                    • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                    • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                    APIs
                    • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                      • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                    • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                    • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                    • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                    • String ID:
                    • API String ID: 2141228402-0
                    • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                    • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                    • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                    • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                    APIs
                    • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                    • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                    • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: Read$realloc
                    • String ID: ?!@
                    • API String ID: 1241503663-708128716
                    • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                    • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                    • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                    • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                    APIs
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: rand$wcslen$ComputerNamesrand
                    • String ID:
                    • API String ID: 3058258771-0
                    • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                    • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                    • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                    • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                    APIs
                    • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                    • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                    • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                    • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                    • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                    • String ID:
                    • API String ID: 2935503933-0
                    • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                    • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                    • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                    • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                    APIs
                    • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                    • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                    • Sleep.KERNEL32(000003E8), ref: 00401F40
                    • CloseHandle.KERNEL32(00000000), ref: 00401F52
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleMutexOpenSleepsprintf
                    • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                    • API String ID: 2780352083-2959021817
                    • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                    • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                    • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                    • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                    APIs
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??0exception@@ExceptionThrowmemcpy
                    • String ID:
                    • API String ID: 2382887404-0
                    • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                    • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                    • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                    • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                    APIs
                    • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                    • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                    • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                    • fclose.MSVCRT(00000000), ref: 00401058
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: fclosefopenfreadfwrite
                    • String ID: c.wnry
                    • API String ID: 4000964834-3240288721
                    • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                    • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                    • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                    • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                    APIs
                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                    • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                    • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                    • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                    • String ID:
                    • API String ID: 2811923685-0
                    • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                    • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                    • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                    • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                    APIs
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Pointer$??2@Create
                    • String ID:
                    • API String ID: 1331958074-0
                    • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                    • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                    • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                    • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                    APIs
                    • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                    • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_stricmp
                    • String ID: P!@
                    • API String ID: 1278613211-1774101457
                    • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                    • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                    • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                    • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                    APIs
                    • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                    • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFilestrcmp
                    • String ID: c.wnry
                    • API String ID: 3324900478-3240288721
                    • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                    • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                    • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                    • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                    APIs
                    • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                    • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                    Strings
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??3@CloseHandle
                    • String ID: $l@
                    • API String ID: 3816424416-2140230165
                    • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                    • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                    • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                    • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                    APIs
                    • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                    • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                    Memory Dump Source
                    • Source File: 00000007.00000002.1710950719.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000007.00000002.1710906938.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1710976796.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711031044.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FD000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000005FF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.0000000000602000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006D7000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DA000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006EF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000007.00000002.1711046863.00000000006F3000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$Leave$Entermemcpy
                    • String ID:
                    • API String ID: 3435569088-0
                    • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                    • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                    • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                    • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65