Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
txWVWM8Kx4.dll

Overview

General Information

Sample name:txWVWM8Kx4.dll
renamed because original name is a hash value
Original sample name:07a5d326b196d166dc0618e7c25ac2b5.dll
Analysis ID:1592069
MD5:07a5d326b196d166dc0618e7c25ac2b5
SHA1:7a23e2ef0682cfb8813a27dc559da187f9e178f5
SHA256:5d7fa45d2fcb10893ee5bdbfc4b16bdeeffd34aa5791331332a8bbb1015cb63b
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Found Tor onion address
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses cmd line tools excessively to alter registry or file data
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4856 cmdline: loaddll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3148 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3816 cmdline: rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 3176 cmdline: C:\WINDOWS\mssecsvc.exe MD5: A75A57A712300662CE3FF1447A0C4805)
          • tasksche.exe (PID: 3552 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 79409B6F48460807480E4A574312D85F)
            • tasksche.exe (PID: 2520 cmdline: C:\ProgramData\dsvqhifq359\tasksche.exe MD5: 79409B6F48460807480E4A574312D85F)
              • attrib.exe (PID: 6512 cmdline: attrib +h . MD5: 0E938DD280E83B1596EC6AA48729C2B0)
                • conhost.exe (PID: 6196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • icacls.exe (PID: 6788 cmdline: icacls . /grant Everyone:F /T /C /Q MD5: 2E49585E4E08565F52090B144062F97E)
                • conhost.exe (PID: 3788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • attrib.exe (PID: 3568 cmdline: attrib +h . MD5: 0E938DD280E83B1596EC6AA48729C2B0)
              • conhost.exe (PID: 2124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • icacls.exe (PID: 3872 cmdline: icacls . /grant Everyone:F /T /C /Q MD5: 2E49585E4E08565F52090B144062F97E)
              • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rundll32.exe (PID: 3868 cmdline: rundll32.exe C:\Users\user\Desktop\txWVWM8Kx4.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1120 cmdline: rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 6332 cmdline: C:\WINDOWS\mssecsvc.exe MD5: A75A57A712300662CE3FF1447A0C4805)
        • tasksche.exe (PID: 2804 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 79409B6F48460807480E4A574312D85F)
          • tasksche.exe (PID: 2972 cmdline: C:\ProgramData\dsvqhifq359\tasksche.exe MD5: 79409B6F48460807480E4A574312D85F)
            • attrib.exe (PID: 6160 cmdline: attrib +h . MD5: 0E938DD280E83B1596EC6AA48729C2B0)
              • conhost.exe (PID: 4824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • icacls.exe (PID: 6052 cmdline: icacls . /grant Everyone:F /T /C /Q MD5: 2E49585E4E08565F52090B144062F97E)
              • conhost.exe (PID: 5728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • attrib.exe (PID: 7160 cmdline: attrib +h . MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • icacls.exe (PID: 7140 cmdline: icacls . /grant Everyone:F /T /C /Q MD5: 2E49585E4E08565F52090B144062F97E)
            • conhost.exe (PID: 5688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • mssecsvc.exe (PID: 616 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: A75A57A712300662CE3FF1447A0C4805)
  • cmd.exe (PID: 320 cmdline: cmd.exe /c "C:\ProgramData\dsvqhifq359\tasksche.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • tasksche.exe (PID: 5268 cmdline: C:\ProgramData\dsvqhifq359\tasksche.exe MD5: 79409B6F48460807480E4A574312D85F)
      • attrib.exe (PID: 7096 cmdline: attrib +h . MD5: 0E938DD280E83B1596EC6AA48729C2B0)
        • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 7084 cmdline: icacls . /grant Everyone:F /T /C /Q MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 2944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 3816 cmdline: cmd.exe /c "C:\ProgramData\dsvqhifq359\tasksche.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • tasksche.exe (PID: 7120 cmdline: C:\ProgramData\dsvqhifq359\tasksche.exe MD5: 79409B6F48460807480E4A574312D85F)
      • attrib.exe (PID: 1892 cmdline: attrib +h . MD5: 0E938DD280E83B1596EC6AA48729C2B0)
        • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 1016 cmdline: icacls . /grant Everyone:F /T /C /Q MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
txWVWM8Kx4.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    txWVWM8Kx4.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x38f735:$x2: taskdl.exe
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x38fe99:$s2: Windows 10 -->
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x38f307:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    txWVWM8Kx4.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\r.wnryWannaCry_RansomNoteDetects WannaCry Ransomware NoteFlorian Roth
    • 0x27c:$s1: A: Don't worry about decryption.
    • 0x0:$s2: Q: What's wrong with my files?
    C:\ProgramData\dsvqhifq359\r.wnryWannaCry_RansomNoteDetects WannaCry Ransomware NoteFlorian Roth
    • 0x27c:$s1: A: Don't worry about decryption.
    • 0x0:$s2: Q: What's wrong with my files?
    C:\ProgramData\dsvqhifq359\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\ProgramData\dsvqhifq359\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0x35962d:$x2: taskdl.exe
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0x359d91:$s2: Windows 10 -->
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x3591ff:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\ProgramData\dsvqhifq359\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      Click to see the 5 entries
      SourceRuleDescriptionAuthorStrings
      0000001F.00000002.2605730753.000000000040F000.00000004.00000001.01000000.00000008.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000002.2068015450.000000000040F000.00000004.00000001.01000000.00000008.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000007.00000000.2056001605.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000A.00000000.2060906503.000000000040E000.00000008.00000001.01000000.00000008.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          Click to see the 32 entries
          SourceRuleDescriptionAuthorStrings
          7.2.mssecsvc.exe.1e74084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          7.2.mssecsvc.exe.1e74084.3.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
          • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
          • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
          • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
          7.2.mssecsvc.exe.23918c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          7.2.mssecsvc.exe.23918c8.9.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
          • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
          • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
          • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
          7.0.mssecsvc.exe.7100a4.1.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 170 entries
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: txWVWM8Kx4.dllAvira: detected
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeReversingLabs: Detection: 92%
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 92%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 92%
            Source: txWVWM8Kx4.dllReversingLabs: Detection: 94%
            Source: txWVWM8Kx4.dllVirustotal: Detection: 91%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: txWVWM8Kx4.dllJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeCode function: 8_2_00401861 CryptImportKey,8_2_00401861
            Source: C:\Windows\tasksche.exeCode function: 8_2_0040182C CryptAcquireContextA,8_2_0040182C
            Source: C:\Windows\tasksche.exeCode function: 8_2_004019E1 EnterCriticalSection,CryptDecrypt,LeaveCriticalSection,LeaveCriticalSection,memcpy,8_2_004019E1
            Source: C:\Windows\tasksche.exeCode function: 8_2_004018F9 CreateFileA,GetFileSize,GlobalAlloc,ReadFile,CryptImportKey,_local_unwind2,8_2_004018F9
            Source: C:\Windows\tasksche.exeCode function: 8_2_004018B9 CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,8_2_004018B9

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: txWVWM8Kx4.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49903 version: TLS 1.0
            Source: C:\Windows\SysWOW64\icacls.exeDirectory queried: number of queries: 1128
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3aJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\NULLJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODBJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\NULLJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\NULLJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\adodb.dllJump to behavior

            Networking

            barindex
            Source: tasksche.exe, 00000008.00000003.3083651538.0000000002458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Cgx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: tasksche.exe, 00000008.00000002.3097641261.0000000002440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: tasksche.exe, 0000000A.00000002.2069229632.0000000001210000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: tasksche.exe, 00000011.00000002.3129573499.0000000002670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: tasksche.exe, 00000013.00000002.2093470170.0000000001120000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: tasksche.exe, 0000001A.00000002.2583314709.0000000002430000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip]
            Source: tasksche.exe, 0000001F.00000002.2606203668.00000000008D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zipd
            Source: c.wnry.10.drString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: c.wnry.8.drString found in binary or memory: C115p7UMMngoj1pMvkpHijcRdfJNXj6LrLngx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
            Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49903 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
            Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
            Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.23
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.23
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.23
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.23
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.34.64.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.129
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.129
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.129
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.129
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 59.178.161.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.2
            Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
            Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.2
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.2
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.2
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 161.26.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.157
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.157
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.157
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.157
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: unknownTCP traffic detected without corresponding DNS query: 133.14.202.1
            Source: tasksche.exe, 00000008.00000003.3084436455.0000000002443000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000008.00000003.3084603383.0000000002443000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000011.00000003.3108009351.0000000002673000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000011.00000003.3108370134.0000000002673000.00000004.00000020.00020000.00000000.sdmp, m_czech.wnry.8.dr, m_danish.wnry.8.dr, m_czech.wnry.10.dr, m_danish.wnry.10.drString found in binary or memory: http://schemas.micr
            Source: m_japanese.wnry.8.dr, m_japanese.wnry.10.drString found in binary or memory: http://schemas.microso
            Source: m_vietnamese.wnry.8.dr, m_vietnamese.wnry.10.drString found in binary or memory: http://schemas.microsoft.
            Source: c.wnry.8.drString found in binary or memory: https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip
            Source: tasksche.exe, 0000001F.00000002.2606203668.00000000008D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zipd
            Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
            Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,ReadFile,memcmp,strrchr,ReadFile,ReadFile,ReadFile,ReadFile,GlobalAlloc,ReadFile,_local_unwind2, WANACRY!8_2_004014B3
            Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,ReadFile,memcmp,strrchr,ReadFile,ReadFile,ReadFile,ReadFile,GlobalAlloc,ReadFile,_local_unwind2, WANACRY!8_2_004014A6
            Source: Yara matchFile source: txWVWM8Kx4.dll, type: SAMPLE
            Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.239c8e8.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.1e7f0a4.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.23a0948.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvc.exe.1e83104.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.2056001605.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.2086246634.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.2053811513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.2056132349.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.2086390129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.2053681836.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000000.2082010028.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2693479834.0000000001E83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000000.2082127312.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2693749913.00000000023A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3176, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 616, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6332, type: MEMORYSTR
            Source: Yara matchFile source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPED
            Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
            Source: C:\Windows\tasksche.exeCode function: 8_2_00401861 CryptImportKey,8_2_00401861
            Source: C:\Windows\tasksche.exeCode function: 8_2_004018F9 CreateFileA,GetFileSize,GlobalAlloc,ReadFile,CryptImportKey,_local_unwind2,8_2_004018F9

            System Summary

            barindex
            Source: txWVWM8Kx4.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: txWVWM8Kx4.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.1e74084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1e74084.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.23918c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.23918c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.239c8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.239c8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.1e7f0a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1e7f0a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.23a0948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.23a0948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvc.exe.1e83104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvc.exe.1e83104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000001F.00000002.2605730753.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000002.2068015450.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000000.2060906503.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000013.00000002.2092835134.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000000.2053811513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000001A.00000002.2582916598.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000000.2056132349.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000010.00000002.2086390129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000013.00000000.2087719412.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000000.2058421206.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000001A.00000000.2577645149.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000011.00000000.2085577185.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000001F.00000000.2599504308.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000011.00000002.3127527649.000000000040F000.00000004.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000002.2693479834.0000000001E83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000010.00000000.2082127312.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000002.2693749913.00000000023A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\r.wnry, type: DROPPEDMatched rule: Detects WannaCry Ransomware Note Author: Florian Roth
            Source: C:\ProgramData\dsvqhifq359\r.wnry, type: DROPPEDMatched rule: Detects WannaCry Ransomware Note Author: Florian Roth
            Source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\b.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\c.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msgJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_bulgarian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_chinese (simplified).wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_chinese (traditional).wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_croatian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_czech.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_danish.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_dutch.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_english.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_filipino.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_finnish.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_french.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_german.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_greek.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_indonesian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_italian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_japanese.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_korean.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_latvian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_norwegian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_polish.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_portuguese.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_romanian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_russian.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_slovak.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_spanish.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_swedish.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_turkish.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\msg\m_vietnamese.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\r.wnryJump to behavior
            Source: C:\Windows\tasksche.exeFile created: C:\WINDOWS\s.wnryJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeCode function: 8_2_00402A768_2_00402A76
            Source: C:\Windows\tasksche.exeCode function: 8_2_00402E7E8_2_00402E7E
            Source: C:\Windows\tasksche.exeCode function: 8_2_0040350F8_2_0040350F
            Source: C:\Windows\tasksche.exeCode function: 8_2_00404C198_2_00404C19
            Source: C:\Windows\tasksche.exeCode function: 8_2_0040541F8_2_0040541F
            Source: C:\Windows\tasksche.exeCode function: 8_2_00406D268_2_00406D26
            Source: C:\Windows\tasksche.exeCode function: 8_2_004043D18_2_004043D1
            Source: C:\Windows\tasksche.exeCode function: 8_2_004037978_2_00403797
            Source: C:\Windows\tasksche.exeCode function: 8_2_004031BC8_2_004031BC
            Source: Joe Sandbox ViewDropped File: C:\ProgramData\dsvqhifq359\tasksche.exe 331E14A6594B700B6167690430C9DA72FEE72D408DD1B8C5CB155C0199033D0A
            Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 331E14A6594B700B6167690430C9DA72FEE72D408DD1B8C5CB155C0199033D0A
            Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 331E14A6594B700B6167690430C9DA72FEE72D408DD1B8C5CB155C0199033D0A
            Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: tasksche.exe.8.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: txWVWM8Kx4.dllBinary or memory string: OriginalFilenamediskpart.exej% vs txWVWM8Kx4.dll
            Source: txWVWM8Kx4.dllBinary or memory string: OriginalFilenamelhdfrgui.exej% vs txWVWM8Kx4.dll
            Source: txWVWM8Kx4.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: txWVWM8Kx4.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: txWVWM8Kx4.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.1e74084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1e74084.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.23918c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.23918c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 16.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 16.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 26.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 19.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 31.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.23c396c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 17.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 16.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 26.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 19.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.2.mssecsvc.exe.23a0948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 17.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 16.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.2.mssecsvc.exe.1e83104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.1ea6128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.2.mssecsvc.exe.23918c8.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 31.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.239c8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.239c8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.1e7f0a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1e7f0a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.23a0948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.23a0948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.23c396c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 16.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.1ea6128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.mssecsvc.exe.1e74084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 16.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvc.exe.1e83104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvc.exe.1e83104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000001F.00000002.2605730753.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000002.2068015450.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000000.2060906503.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000013.00000002.2092835134.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000000.2053811513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000001A.00000002.2582916598.000000000040F000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000000.2056132349.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000010.00000002.2086390129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000013.00000000.2087719412.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000000.2058421206.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000001A.00000000.2577645149.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000011.00000000.2085577185.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000001F.00000000.2599504308.000000000040E000.00000008.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000011.00000002.3127527649.000000000040F000.00000004.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000002.2693479834.0000000001E83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000010.00000000.2082127312.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000002.2693749913.00000000023A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\r.wnry, type: DROPPEDMatched rule: WannaCry_RansomNote date = 2017-05-12, hash1 = 4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e, author = Florian Roth, description = Detects WannaCry Ransomware Note, reference = https://goo.gl/HG2j5T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\ProgramData\dsvqhifq359\r.wnry, type: DROPPEDMatched rule: WannaCry_RansomNote date = 2017-05-12, hash1 = 4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e, author = Florian Roth, description = Detects WannaCry Ransomware Note, reference = https://goo.gl/HG2j5T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\ProgramData\dsvqhifq359\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: tasksche.exe.5.drBinary string: h\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\MOP030B\American McGee's Alice
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Transactions\03edc404e68b95b7e0b07a0416c8e4a7\System.Transactions.ni.dll.auxthp
            Source: tasksche.exe.5.drBinary string: `\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Image ViewerD
            Source: tasksche.exe.5.drBinary string: I\Device\HarddiskVolume1\Program Files\Microsoft Office\Office14\EXCEL.EXEp
            Source: tasksche.exe.5.drBinary string: {\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.inihip
            Source: tasksche.exe.5.drBinary string: >\Device\HarddiskVolume1\Program Files\TrueKey\TrueKeyVault.dllty
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\ksuser.dllorp
            Source: tasksche.exe.5.drBinary string: w\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Harry Potter and the Deathly Hallows - Part 1p
            Source: tasksche.exe.5.drBinary string: e\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndexp
            Source: tasksche.exe.5.drBinary string: K\Device\HarddiskVolume1\Program Files\Microsoft Office\Office14\WINWORD.EXEd-p
            Source: tasksche.exe.5.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\wbem\Logsthip
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010002.wsbep
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010003.widlp
            Source: tasksche.exe.5.drBinary string: 8\Device\HarddiskVolume1\Program Files\TrueKey\thrift.dllop
            Source: tasksche.exe.5.drBinary string: y\Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Data7706cdc8#\33056cb1c9e7cf51ee0a4168997f0db4p
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\CustomMarshalers\fa881a9dd9820b29ec20e9d90c6a0d99\CustomMarshalers.ni.dll.auxp
            Source: tasksche.exe.5.drBinary string: S\Device\HarddiskVolume1\Windows\Microsoft.NET\Framework\v4.0.30319\diasymreader.dll||p
            Source: tasksche.exe.5.drBinary string: :\Device\HarddiskVolume1\Windows\System32\config\COMPONENTSxyz
            Source: tasksche.exe.5.drBinary string: V\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\tmp.edbbrep
            Source: tasksche.exe.5.drBinary string: _\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex
            Source: tasksche.exe.5.drBinary string: K\Device\HarddiskVolume1\Windows\System32\config\systemprofile\AppData\Localtyp
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\msidle.dllarp
            Source: tasksche.exe.5.drBinary string: L\Device\HarddiskVolume1\Program Files\TrueKey\providers\deviceIDProvider.dll.p
            Source: tasksche.exe.5.drBinary string: h\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Skachat Torrent
            Source: tasksche.exe.5.drBinary string: X\Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Dired13b18a9#ep
            Source: tasksche.exe.5.drBinary string: N\Device\HarddiskVolume1\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllt^$p
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Dired13b18a9#\cf330aa5c9f2a48448933edac5333406\System.DirectoryServices.ni.dll.auxp
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\QAGENT.DLLEtp
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\scrrun.dll@
            Source: tasksche.exe.5.drBinary string: <\Device\HarddiskVolume1\Windows\System32\ru-RU\tzres.dll.muiap
            Source: tasksche.exe.5.drBinary string: x\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\CiPT0000.001pF
            Source: tasksche.exe.5.drBinary string: r\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\/
            Source: tasksche.exe.5.drBinary string: 8\Device\HarddiskVolume1\Windows\System32\mfreadwrite.dll.p
            Source: tasksche.exe.5.drBinary string: _\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\/
            Source: tasksche.exe.5.drBinary string: l\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore|.
            Source: tasksche.exe.5.drBinary string: E\Device\HarddiskVolume1\Program Files\TrueKey\logs\Log.2017-05-12.logp
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.DataSetExtensions\v4.0_4.0.0.0__b77a5c561934e089\System.Data.DataSetExtensions.dllnksp
            Source: tasksche.exe.5.drBinary string: S\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\PotPlayer
            Source: tasksche.exe.5.drBinary string: F\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applicationspar
            Source: tasksche.exe.5.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\adsnt.dll.cop
            Source: tasksche.exe.5.drBinary string: G\Device\HarddiskVolume1\ProgramData\Bluestacks\Logs\BlueStacksUsers.log.np
            Source: tasksche.exe.5.drBinary string: Q\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\MOP030B&
            Source: tasksche.exe.5.drBinary string: l\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStoreu.
            Source: tasksche.exe.5.drBinary string: L\Device\HarddiskVolume1\Program Files\Microsoft Office\Office14\POWERPNT.EXEk
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\mfplat.dllmgp
            Source: tasksche.exe.5.drBinary string: K\Device\HarddiskVolume1\Users\User\AppData\Local\Yandex\BrowserManager\datay
            Source: tasksche.exe.5.drBinary string: p\Device\HarddiskVolume1\Windows\System32\winevt\Logs\Microsoft-Windows-NetworkAccessProtection%4Operational.evtxp
            Source: tasksche.exe.5.drBinary string: e\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Suicide Squad - Special OpsN
            Source: tasksche.exe.5.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\rundll32.exep
            Source: tasksche.exe.5.drBinary string: c\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex^$,
            Source: tasksche.exe.5.drBinary string: P\Device\HarddiskVolume1\Windows\System32\api-ms-win-downlevel-shell32-l1-1-0.dllap
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\cc649e0f5426f48bb9361c159b8e707f\System.Data.ni.dll.aux
            Source: tasksche.exe.5.drBinary string: V\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.chkann
            Source: tasksche.exe.5.drBinary string: W\Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Transactionsro|
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dllhp
            Source: tasksche.exe.5.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\ru-RU\WUDFHost.exe.mui
            Source: tasksche.exe.5.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\config\COMPONENTS.LOG1
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Transactions\03edc404e68b95b7e0b07a0416c8e4a7\System.Transactions.ni.dlldi
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010003.ciy
            Source: tasksche.exe.5.drBinary string: O\Device\HarddiskVolume1\Program Files\NVIDIA Corporation\Display\nvsmartmax.dll^$p
            Source: tasksche.exe.5.drBinary string: _\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Paint.lnk
            Source: tasksche.exe.5.drBinary string: T\Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\CustomMarshalersep
            Source: tasksche.exe.5.drBinary string: p\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\StarGame\Alice.Madness Returns + 2 DLCp
            Source: tasksche.exe.5.drBinary string: y\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Windows Explorer.lnkp
            Source: tasksche.exe.5.drBinary string: L\Device\HarddiskVolume1\Program Files\TrueKey\providers\LocationProvider.dllph
            Source: tasksche.exe.5.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\drivers\UMDF\WpdFs.dll
            Source: tasksche.exe.5.drBinary string: z\Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xaml\v4.0_4.0.0.0__b77a5c561934e089\System.Xaml.dllU+
            Source: tasksche.exe.5.drBinary string: S\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDjView
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\wbem\ru-RU
            Source: tasksche.exe.5.drBinary string: l\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStoren.
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement\v4.0_4.0.0.0__b77a5c561934e089\System.DirectoryServices.AccountManagement.dllcp
            Source: tasksche.exe.5.drBinary string: O\Device\HarddiskVolume1\Users\User\AppData\Local\Yandex\BrowserManager\settingsrd
            Source: tasksche.exe.5.drBinary string: W\Device\HarddiskVolume1\Program Files\Alice.Madness Returns + 2 DLC\GDFBinary.en-us.dll.cp
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010003.dir-p
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\netman.dllhip
            Source: tasksche.exe.5.drBinary string: l\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStoreeH
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dllp
            Source: tasksche.exe.5.drBinary string: X\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\World of Tanks
            Source: tasksche.exe.5.drBinary string: _\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AIDA64@
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dllap
            Source: tasksche.exe.5.drBinary string: O\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Skype
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dllsitp
            Source: tasksche.exe.5.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\bthprops.cplp
            Source: tasksche.exe.5.drBinary string: x\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\CiPT0000.000rp
            Source: tasksche.exe.5.drBinary string: y\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.002H
            Source: tasksche.exe.5.drBinary string: R\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\StarGame
            Source: tasksche.exe.5.drBinary string: ?\Device\HarddiskVolume1\Windows\System32\config\COMPONENTS.LOG2.cp
            Source: tasksche.exe.5.drBinary string: E\Device\HarddiskVolume1\Program Files\Bluestacks\HD-Logger-Native.dllp
            Source: tasksche.exe.5.drBinary string: Q\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\MOP030Bp
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\37523c98ca4b37b2a6d189294e443202\System.Runtime.Serialization.ni.dllp
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\37523c98ca4b37b2a6d189294e443202\System.Runtime.Serialization.ni.dll.auxp
            Source: tasksche.exe.5.drBinary string: y\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.001p
            Source: tasksche.exe.5.drBinary string: k\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMaptyp
            Source: tasksche.exe.5.drBinary string: l\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStoreg.
            Source: tasksche.exe.5.drBinary string: H\Device\HarddiskVolume1\Program Files\TrueKey\providers\faceProvider.dllsp
            Source: tasksche.exe.5.drBinary string: ^\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Games
            Source: tasksche.exe.5.drBinary string: R\Device\HarddiskVolume1\Users\User\AppData\Local\Yandex\BrowserManager\Logs\bm.logparp
            Source: tasksche.exe.5.drBinary string: q\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenup
            Source: tasksche.exe.5.drBinary string: Q\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Nero 11p
            Source: tasksche.exe.5.drBinary string: T\Device\HarddiskVolume1\Users\User\AppData\Local\Yandex\BrowserManager\data\settingscp
            Source: tasksche.exe.5.drBinary string: D\Device\HarddiskVolume1\Windows\assembly\GAC_MSIL\mscorlib.resourcesgp
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\tquery.dlllep
            Source: tasksche.exe.5.drBinary string: V\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\tmp.edbfirp
            Source: tasksche.exe.5.drBinary string: |\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts8
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7601.18766_none_0b32a93025b365c1\wcp.dllp
            Source: tasksche.exe.5.drBinary string: y\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.001H
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\FXSAPI.dllcop
            Source: tasksche.exe.5.drBinary string: 7\Device\HarddiskVolume1\Windows\System32\CertEnroll.dllarp
            Source: tasksche.exe.5.drBinary string: Y\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogsp
            Source: tasksche.exe.5.drBinary string: /\Device\HarddiskVolume1\Windows\System32\mf.dlly
            Source: tasksche.exe.5.drBinary string: c\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\McAfee Security Scan Plus
            Source: tasksche.exe.5.drBinary string: 2\Device\HarddiskVolume1\Windows\System32\wshom.ocx
            Source: tasksche.exe.5.drBinary string: 6\Device\HarddiskVolume1\Windows\System32\srchadmin.dll
            Source: tasksche.exe.5.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\WMVCORE.DLLip
            Source: tasksche.exe.5.drBinary string: G\Device\HarddiskVolume1\Program Files\Windows Media Player\wmpnssci.dll
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\cc649e0f5426f48bb9361c159b8e707f\System.Data.ni.dll0
            Source: tasksche.exe.5.drBinary string: 4\Device\HarddiskVolume1\Windows\servicing\CbsMsg.dllp
            Source: tasksche.exe.5.drBinary string: x\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\CiPT0000.002xp
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010002.dirmp
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\rasdlg.dllinp
            Source: tasksche.exe.5.drBinary string: S\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\PotPlayer@
            Source: tasksche.exe.5.drBinary string: 7\Device\HarddiskVolume1\Windows\System32\CertEnroll.dllku
            Source: tasksche.exe.5.drBinary string: 9\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Datap
            Source: tasksche.exe.5.drBinary string: G\Device\HarddiskVolume1\ProgramData\NVIDIA Corporation\Drs\nvdrsdb1.binlip
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Ease of Access.lnkp
            Source: tasksche.exe.5.drBinary string: m\Device\HarddiskVolume1\Windows\Microsoft.NET\Framework\v4.0.30319\WorkflowServiceHostPerformanceCounters.dllp
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Dired13b18a9#\cf330aa5c9f2a48448933edac5333406\System.DirectoryServices.ni.dll
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\CustomMarshalers\fa881a9dd9820b29ec20e9d90c6a0d99\CustomMarshalers.ni.dllx
            Source: tasksche.exe.5.drBinary string: 7\Device\HarddiskVolume1\Windows\System32\CertEnroll.dllco
            Source: tasksche.exe.5.drBinary string: H\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Temp\usgthrsvcrp
            Source: tasksche.exe.5.drBinary string: y\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.000H
            Source: tasksche.exe.5.drBinary string: :\Device\HarddiskVolume1\Windows\System32\wbem\cimwin32.dll
            Source: tasksche.exe.5.drBinary string: V\Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.logparp
            Source: tasksche.exe.5.drBinary string: X\Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Data7706cdc8#ep
            Source: tasksche.exe.5.drBinary string: >\Device\HarddiskVolume1\Windows\System32\en-US\azroles.dll.mui
            Source: tasksche.exe.5.drBinary string: X\Device\HarddiskVolume1\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#p
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010002.ci||p
            Source: tasksche.exe.5.drBinary string: V\Device\HarddiskVolume1\Users\User\AppData\Local\Yandex\BrowserManager\Crypto.Core.dll||cp
            Source: tasksche.exe.5.drBinary string: 4\Device\HarddiskVolume1\ProgramData\Microsoft\Searchup
            Source: tasksche.exe.5.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\mspaint.exejp
            Source: tasksche.exe.5.drBinary string: 3\Device\HarddiskVolume1\Windows\System32\wscapi.dll.pp
            Source: tasksche.exe.5.drBinary string: J\Device\HarddiskVolume1\Program Files\Microsoft Office\Office14\MSTORE.EXEes.p
            Source: tasksche.exe.5.drBinary string: D\Device\HarddiskVolume1\Program Files\TrueKey\system.data.sqlite.dllnp
            Source: tasksche.exe.5.drBinary string: e\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\Suicide Squad - Special Ops
            Source: tasksche.exe.5.drBinary string: ;\Device\HarddiskVolume1\Program Files\Skype\Phone\Skype.exeetp
            Source: tasksche.exe.5.drBinary string: @\Device\HarddiskVolume1\Program Files\TrueKey\sqlite.interop.dllop
            Source: tasksche.exe.5.drBinary string: \\Device\HarddiskVolume1\ProgramData\Microsoft\Windows\Start Menu\Programs\PRO"
            Source: tasksche.exe.5.drBinary string: |\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts$p
            Source: tasksche.exe.5.drBinary string: 4\Device\HarddiskVolume1\Windows\System32\ieframe.dllnF
            Source: tasksche.exe.5.drBinary string: ,\Device\HarddiskVolume1\Users\User\Favorites-p
            Source: tasksche.exe.5.drBinary string: v\Device\HarddiskVolume1\Program Files\Alice.Madness Returns + 2 DLC\Game\Alice2\Binaries\Win32\AliceMadnessReturns.exe|mop
            Source: tasksche.exe.5.drBinary string: 5\Device\HarddiskVolume1\Windows\System32\perfproc.dllp
            Source: tasksche.exe.5.drBinary string: 7\Device\HarddiskVolume1\Windows\System32\framedynos.dll
            Source: tasksche.exe.5.drBinary string: \Device\HarddiskVolume1\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dllp
            Source: tasksche.exe.5.drBinary string: ~\Device\HarddiskVolume1\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Magnify.lnkT+
            Source: mssecsvc.exe, 00000005.00000000.2053811513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000007.00000000.2056132349.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000007.00000002.2693479834.0000000001E83000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2693749913.00000000023A0000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000008.00000000.2058421206.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmp, tasksche.exe, 0000000A.00000000.2060906503.000000000040E000.00000008.00000001.01000000.00000008.sdmp, tasksche.exe, 0000000A.00000002.2067985985.000000000040E000.00000008.00000001.01000000.00000008.sdmp, mssecsvc.exe, 00000010.00000002.2086390129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 00000011.00000002.3127479884.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 00000011.00000000.2085577185.000000000040E000.00000008.00000001.01000000.00000007.sdmpBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@66/67@0/100
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
            Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00401CE8
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
            Source: C:\Windows\mssecsvc.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5728:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2944:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6196:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2124:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6504:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6084:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5532:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5688:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7096:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6520:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4824:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3788:120:WilError_03
            Source: txWVWM8Kx4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\txWVWM8Kx4.dll,PlayGame
            Source: txWVWM8Kx4.dllReversingLabs: Detection: 94%
            Source: txWVWM8Kx4.dllVirustotal: Detection: 91%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\txWVWM8Kx4.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c "C:\ProgramData\dsvqhifq359\tasksche.exe"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",PlayGame
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c "C:\ProgramData\dsvqhifq359\tasksche.exe"
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\tasksche.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\tasksche.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\txWVWM8Kx4.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\tasksche.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .Jump to behavior
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /QJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exeJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .Jump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /QJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\tasksche.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .Jump to behavior
            Source: C:\Windows\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /QJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .Jump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /QJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .Jump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /QJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h .Jump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /QJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\tasksche.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dll
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: txWVWM8Kx4.dllStatic file information: File size 5267459 > 1048576
            Source: txWVWM8Kx4.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 8_2_00407710 push eax; ret 8_2_0040773E
            Source: C:\Windows\tasksche.exeCode function: 8_2_004076C8 push eax; ret 8_2_004076E6

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exe
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exe
            Source: C:\Windows\tasksche.exeProcess created: attrib.exe
            Source: C:\Windows\tasksche.exeProcess created: attrib.exe
            Source: C:\Windows\tasksche.exeProcess created: attrib.exeJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exeJump to behavior
            Source: C:\Windows\tasksche.exeProcess created: attrib.exeJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exeJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exeJump to behavior
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: attrib.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\tasksche.exeFile created: C:\ProgramData\dsvqhifq359\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\tasksche.exeFile created: C:\ProgramData\dsvqhifq359\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\ProgramData\dsvqhifq359\tasksche.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls . /grant Everyone:F /T /C /Q
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 5440Thread sleep count: 97 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 5440Thread sleep time: -194000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 2972Thread sleep count: 122 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 2972Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 5440Thread sleep time: -86400000s >= -30000sJump to behavior
            Source: C:\Windows\tasksche.exe TID: 3640Thread sleep count: 58 > 30Jump to behavior
            Source: C:\Windows\tasksche.exe TID: 3640Thread sleep time: -58000s >= -30000sJump to behavior
            Source: C:\Windows\tasksche.exe TID: 3640Thread sleep count: 59 > 30Jump to behavior
            Source: C:\Windows\tasksche.exe TID: 3640Thread sleep time: -59000s >= -30000sJump to behavior
            Source: C:\Windows\tasksche.exe TID: 5880Thread sleep count: 58 > 30Jump to behavior
            Source: C:\Windows\tasksche.exe TID: 5880Thread sleep time: -58000s >= -30000sJump to behavior
            Source: C:\Windows\tasksche.exe TID: 5880Thread sleep count: 59 > 30Jump to behavior
            Source: C:\Windows\tasksche.exe TID: 5880Thread sleep time: -59000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3aJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\NULLJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODBJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\NULLJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\NULLJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\adodb.dllJump to behavior
            Source: mssecsvc.exe, 00000005.00000002.2060012832.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
            Source: mssecsvc.exe, 00000007.00000002.2693091180.0000000000B38000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000010.00000002.2086826305.0000000000C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 8_2_004029CC free,GetProcessHeap,HeapFree,8_2_004029CC
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exeJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\dsvqhifq359\tasksche.exe C:\ProgramData\dsvqhifq359\tasksche.exe
            Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeDirectory queried: number of queries: 1128
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Command and Scripting Interpreter
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            OS Credential Dumping1
            Network Share Discovery
            Remote Services11
            Archive Collected Data
            22
            Encrypted Channel
            Exfiltration Over Other Network Medium11
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts2
            Service Execution
            1
            Services File Permissions Weakness
            11
            Process Injection
            21
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Services File Permissions Weakness
            11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Proxy
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Obfuscated Files or Information
            NTDS11
            File and Directory Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Services File Permissions Weakness
            LSA Secrets12
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Rundll32
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1592069 Sample: txWVWM8Kx4.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 132 Malicious sample detected (through community Yara rule) 2->132 134 Antivirus / Scanner detection for submitted sample 2->134 136 Multi AV Scanner detection for dropped file 2->136 138 5 other signatures 2->138 12 loaddll32.exe 1 2->12         started        14 cmd.exe 2->14         started        16 mssecsvc.exe 2->16         started        20 cmd.exe 2->20         started        process3 dnsIp4 22 cmd.exe 1 12->22         started        24 rundll32.exe 12->24         started        27 conhost.exe 12->27         started        29 rundll32.exe 1 12->29         started        31 tasksche.exe 1 33 14->31         started        110 192.168.2.102 unknown unknown 16->110 112 192.168.2.103 unknown unknown 16->112 114 98 other IPs or domains 16->114 128 Connects to many different private IPs via SMB (likely to spread or exploit) 16->128 130 Connects to many different private IPs (likely to spread or exploit) 16->130 33 tasksche.exe 20->33         started        signatures5 process6 signatures7 35 rundll32.exe 22->35         started        146 Drops executables to the windows directory (C:\Windows) and starts them 24->146 37 mssecsvc.exe 1 24->37         started        148 Antivirus detection for dropped file 31->148 150 Multi AV Scanner detection for dropped file 31->150 152 Machine Learning detection for dropped file 31->152 41 icacls.exe 1 31->41         started        43 attrib.exe 1 31->43         started        154 Found Tor onion address 33->154 156 Uses cmd line tools excessively to alter registry or file data 33->156 45 icacls.exe 1 33->45         started        47 attrib.exe 1 33->47         started        process8 file9 49 mssecsvc.exe 1 35->49         started        106 C:\WINDOWS\qeriuwjhrf (copy), PE32 37->106 dropped 144 Drops executables to the windows directory (C:\Windows) and starts them 37->144 52 tasksche.exe 2 37->52         started        55 conhost.exe 41->55         started        57 conhost.exe 43->57         started        59 conhost.exe 45->59         started        61 conhost.exe 47->61         started        signatures10 process11 file12 104 C:\Windows\tasksche.exe, PE32 49->104 dropped 63 tasksche.exe 36 49->63         started        140 Found Tor onion address 52->140 142 Uses cmd line tools excessively to alter registry or file data 52->142 67 tasksche.exe 52->67         started        69 attrib.exe 52->69         started        71 icacls.exe 52->71         started        signatures13 process14 file15 108 C:\ProgramData\dsvqhifq359\tasksche.exe, PE32 63->108 dropped 116 Detected Wannacry Ransomware 63->116 118 Antivirus detection for dropped file 63->118 120 Multi AV Scanner detection for dropped file 63->120 122 Machine Learning detection for dropped file 63->122 73 tasksche.exe 63->73         started        76 icacls.exe 1 63->76         started        78 attrib.exe 1 63->78         started        124 Found Tor onion address 67->124 126 Uses cmd line tools excessively to alter registry or file data 67->126 80 icacls.exe 1 67->80         started        82 attrib.exe 1 67->82         started        84 conhost.exe 69->84         started        86 conhost.exe 71->86         started        signatures16 process17 signatures18 158 Found Tor onion address 73->158 160 Uses cmd line tools excessively to alter registry or file data 73->160 88 icacls.exe 1 73->88         started        90 attrib.exe 1 73->90         started        92 conhost.exe 76->92         started        94 conhost.exe 78->94         started        96 conhost.exe 80->96         started        98 conhost.exe 82->98         started        process19 process20 100 conhost.exe 88->100         started        102 conhost.exe 90->102         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            txWVWM8Kx4.dll95%ReversingLabsWin32.Ransomware.WannaCry
            txWVWM8Kx4.dll92%VirustotalBrowse
            txWVWM8Kx4.dll100%AviraTR/Ransom.Gen
            txWVWM8Kx4.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\ProgramData\dsvqhifq359\tasksche.exe100%AviraTR/Ransom.Gen
            C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
            C:\ProgramData\dsvqhifq359\tasksche.exe100%Joe Sandbox ML
            C:\Windows\tasksche.exe100%Joe Sandbox ML
            C:\ProgramData\dsvqhifq359\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
            C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.microso0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.microsom_japanese.wnry.8.dr, m_japanese.wnry.10.drfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.microsoft.m_vietnamese.wnry.8.dr, m_vietnamese.wnry.10.drfalse
              high
              https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zipdtasksche.exe, 0000001F.00000002.2606203668.00000000008D0000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://schemas.micrtasksche.exe, 00000008.00000003.3084436455.0000000002443000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000008.00000003.3084603383.0000000002443000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000011.00000003.3108009351.0000000002673000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000011.00000003.3108370134.0000000002673000.00000004.00000020.00020000.00000000.sdmp, m_czech.wnry.8.dr, m_danish.wnry.8.dr, m_czech.wnry.10.dr, m_danish.wnry.10.drfalse
                  high
                  https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zipc.wnry.8.drfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    60.171.191.1
                    unknownChina
                    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                    60.171.191.2
                    unknownChina
                    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                    152.117.243.51
                    unknownUnited States
                    11863PLUUSfalse
                    99.19.50.104
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    75.48.114.78
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    95.129.132.1
                    unknownNetherlands
                    42416COMNET-ASNLfalse
                    21.217.77.1
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    188.228.236.160
                    unknownItaly
                    28929ASDASD-ASITfalse
                    108.182.16.49
                    unknownUnited States
                    12271TWC-12271-NYCUSfalse
                    29.147.136.1
                    unknownUnited States
                    7922COMCAST-7922USfalse
                    188.228.236.1
                    unknownItaly
                    28929ASDASD-ASITfalse
                    180.35.1.114
                    unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                    133.14.202.1
                    unknownJapan2907SINET-ASResearchOrganizationofInformationandSystemsNfalse
                    133.14.202.2
                    unknownJapan2907SINET-ASResearchOrganizationofInformationandSystemsNfalse
                    52.34.64.2
                    unknownUnited States
                    16509AMAZON-02USfalse
                    52.34.64.1
                    unknownUnited States
                    16509AMAZON-02USfalse
                    43.89.144.1
                    unknownJapan4249LILLY-ASUSfalse
                    180.35.1.1
                    unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                    43.89.144.111
                    unknownJapan4249LILLY-ASUSfalse
                    41.167.36.1
                    unknownSouth Africa
                    36937Neotel-ASZAfalse
                    74.80.92.140
                    unknownUnited States
                    715WOODYNET-2USfalse
                    108.182.16.1
                    unknownUnited States
                    12271TWC-12271-NYCUSfalse
                    59.178.161.2
                    unknownIndia
                    17813MTNL-APMahanagarTelephoneNigamLimitedINfalse
                    59.178.161.1
                    unknownIndia
                    17813MTNL-APMahanagarTelephoneNigamLimitedINfalse
                    29.147.136.127
                    unknownUnited States
                    7922COMCAST-7922USfalse
                    IP
                    192.168.2.148
                    192.168.2.149
                    192.168.2.146
                    192.168.2.147
                    192.168.2.140
                    192.168.2.141
                    192.168.2.144
                    192.168.2.145
                    192.168.2.142
                    192.168.2.143
                    192.168.2.159
                    192.168.2.157
                    192.168.2.158
                    192.168.2.151
                    192.168.2.152
                    192.168.2.150
                    192.168.2.155
                    192.168.2.156
                    192.168.2.153
                    192.168.2.154
                    192.168.2.126
                    192.168.2.247
                    192.168.2.127
                    192.168.2.248
                    192.168.2.124
                    192.168.2.245
                    192.168.2.125
                    192.168.2.246
                    192.168.2.128
                    192.168.2.249
                    192.168.2.129
                    192.168.2.240
                    192.168.2.122
                    192.168.2.243
                    192.168.2.123
                    192.168.2.244
                    192.168.2.120
                    192.168.2.241
                    192.168.2.121
                    192.168.2.242
                    192.168.2.97
                    192.168.2.137
                    192.168.2.96
                    192.168.2.138
                    192.168.2.99
                    192.168.2.135
                    192.168.2.98
                    192.168.2.136
                    192.168.2.139
                    192.168.2.250
                    192.168.2.130
                    192.168.2.251
                    192.168.2.91
                    192.168.2.90
                    192.168.2.93
                    192.168.2.133
                    192.168.2.254
                    192.168.2.92
                    192.168.2.134
                    192.168.2.95
                    192.168.2.131
                    192.168.2.252
                    192.168.2.94
                    192.168.2.132
                    192.168.2.253
                    192.168.2.104
                    192.168.2.225
                    192.168.2.105
                    192.168.2.226
                    192.168.2.102
                    192.168.2.223
                    192.168.2.103
                    192.168.2.224
                    192.168.2.108
                    192.168.2.229
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1592069
                    Start date and time:2025-01-15 18:11:10 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 17s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:44
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:txWVWM8Kx4.dll
                    renamed because original name is a hash value
                    Original Sample Name:07a5d326b196d166dc0618e7c25ac2b5.dll
                    Detection:MAL
                    Classification:mal100.rans.expl.evad.winDLL@66/67@0/100
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 58%
                    • Number of executed functions: 29
                    • Number of non-executed functions: 26
                    Cookbook Comments:
                    • Found application associated with file extension: .dll
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 84.201.210.39, 2.17.190.73, 217.20.57.36, 13.107.246.45, 20.12.23.50
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                    TimeTypeDescription
                    12:12:04API Interceptor1x Sleep call for process: loaddll32.exe modified
                    12:12:36API Interceptor112x Sleep call for process: mssecsvc.exe modified
                    12:12:36API Interceptor112x Sleep call for process: tasksche.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    PLUUSDEMONS.ppc.elfGet hashmaliciousUnknownBrowse
                    • 152.117.203.132
                    kkkarm.elfGet hashmaliciousUnknownBrowse
                    • 152.117.115.172
                    na.elfGet hashmaliciousUnknownBrowse
                    • 152.117.240.4
                    http://webview.unferal.comGet hashmaliciousUnknownBrowse
                    • 152.117.99.199
                    DCwYFBy6z7.elfGet hashmaliciousMirai, MoobotBrowse
                    • 152.117.167.66
                    SecuriteInfo.com.Trojan.InstallCore.4086.15026.2213.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                    • 152.117.115.162
                    VOD5Th43fb.elfGet hashmaliciousMiraiBrowse
                    • 152.117.203.110
                    5W0nv823TE.elfGet hashmaliciousMiraiBrowse
                    • 152.117.203.139
                    mirai.x86.elfGet hashmaliciousMiraiBrowse
                    • 152.117.218.244
                    yQWPf8hWfh.elfGet hashmaliciousMiraiBrowse
                    • 152.117.203.148
                    CHINANET-BACKBONENo31Jin-rongStreetCNET6LdJaK54.dllGet hashmaliciousWannacryBrowse
                    • 106.230.138.178
                    bot.x86.elfGet hashmaliciousUnknownBrowse
                    • 220.183.55.11
                    bot.spc.elfGet hashmaliciousUnknownBrowse
                    • 14.155.77.28
                    bot.arm5.elfGet hashmaliciousUnknownBrowse
                    • 120.37.0.150
                    bot.mips.elfGet hashmaliciousUnknownBrowse
                    • 114.135.188.251
                    bot.m68k.elfGet hashmaliciousUnknownBrowse
                    • 113.120.26.134
                    bot.sh4.elfGet hashmaliciousUnknownBrowse
                    • 202.98.153.102
                    bot.arm7.elfGet hashmaliciousMiraiBrowse
                    • 210.185.215.218
                    bot.arm.elfGet hashmaliciousUnknownBrowse
                    • 183.68.69.25
                    bot.ppc.elfGet hashmaliciousUnknownBrowse
                    • 183.148.55.61
                    CHINANET-BACKBONENo31Jin-rongStreetCNET6LdJaK54.dllGet hashmaliciousWannacryBrowse
                    • 106.230.138.178
                    bot.x86.elfGet hashmaliciousUnknownBrowse
                    • 220.183.55.11
                    bot.spc.elfGet hashmaliciousUnknownBrowse
                    • 14.155.77.28
                    bot.arm5.elfGet hashmaliciousUnknownBrowse
                    • 120.37.0.150
                    bot.mips.elfGet hashmaliciousUnknownBrowse
                    • 114.135.188.251
                    bot.m68k.elfGet hashmaliciousUnknownBrowse
                    • 113.120.26.134
                    bot.sh4.elfGet hashmaliciousUnknownBrowse
                    • 202.98.153.102
                    bot.arm7.elfGet hashmaliciousMiraiBrowse
                    • 210.185.215.218
                    bot.arm.elfGet hashmaliciousUnknownBrowse
                    • 183.68.69.25
                    bot.ppc.elfGet hashmaliciousUnknownBrowse
                    • 183.148.55.61
                    ATT-INTERNET4USET6LdJaK54.dllGet hashmaliciousWannacryBrowse
                    • 68.209.105.69
                    GeW4GzT8G8.dllGet hashmaliciousVirut, WannacryBrowse
                    • 69.111.126.153
                    bot.x86.elfGet hashmaliciousUnknownBrowse
                    • 74.175.250.164
                    bot.spc.elfGet hashmaliciousUnknownBrowse
                    • 108.230.82.125
                    bot.arm5.elfGet hashmaliciousUnknownBrowse
                    • 65.67.191.109
                    bot.mips.elfGet hashmaliciousUnknownBrowse
                    • 107.137.175.24
                    bot.m68k.elfGet hashmaliciousUnknownBrowse
                    • 99.60.85.5
                    bot.sh4.elfGet hashmaliciousUnknownBrowse
                    • 12.249.84.172
                    bot.arm7.elfGet hashmaliciousMiraiBrowse
                    • 76.249.72.164
                    bot.arm.elfGet hashmaliciousUnknownBrowse
                    • 69.220.94.216
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    1138de370e523e824bbca92d049a3777f5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                    • 23.1.237.91
                    hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                    • 23.1.237.91
                    2lX8Z3eydC.dllGet hashmaliciousWannacryBrowse
                    • 23.1.237.91
                    ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    Personliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    https://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSPT0wVekqsfeOZRSaz9d28itE0eTxOetbwlGaCx05rQJywXo_UNbDpVWBvKTmUslwem1E0EC2Cp68hMzvjQfllUT9E4DZqDf2uiRmAk3QSMceJiv-2FShXGXSXiT9Fl37dFQYscKLxEMcTJj4tm5gMav6Ov9aRXzCg4yzvno75Wb80hSd5kw8Ua5r4R2pwCFTS4zDFYiEkWB-2BYk1VUWtpkJwb9IQIMAq1SSLT005wiJ2XiGw1jPEr6v61MJQRnC7AeLVtxYgqGlydBoPFbs1IP04-2BxPajuRI3fTsnzWZ9ty3RasYpwuqdrF0E8VoyYkggeeLEm9ENK69uYTCVHWHpxCPkzirQSIkvpt5FNZojg491ibS35IgO0LPU5gnpEaeaUj4-2BZoFUHIAAzMMy-2BYqsZ9F9Ldu1c-3D#XGet hashmaliciousHTMLPhisherBrowse
                    • 23.1.237.91
                    NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                    • 23.1.237.91
                    330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                    • 23.1.237.91
                    https://asalto-bart.eu/o/dcvGet hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    https://teiegram-mg.org/Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    C:\Windows\tasksche.exe542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                      UR9TBr66am.dllGet hashmaliciousWannacryBrowse
                        eAx3JV2z84.dllGet hashmaliciousWannacryBrowse
                          C:\ProgramData\dsvqhifq359\tasksche.exe542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                            UR9TBr66am.dllGet hashmaliciousWannacryBrowse
                              eAx3JV2z84.dllGet hashmaliciousWannacryBrowse
                                C:\WINDOWS\qeriuwjhrf (copy)542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                                  UR9TBr66am.dllGet hashmaliciousWannacryBrowse
                                    eAx3JV2z84.dllGet hashmaliciousWannacryBrowse
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:PC bitmap, Windows 3.x format, 800 x 600 x 24, image size 1440000, resolution 3779 x 3779 px/m, cbSize 1440054, bits offset 54
                                      Category:dropped
                                      Size (bytes):1440054
                                      Entropy (8bit):0.3363393123555661
                                      Encrypted:false
                                      SSDEEP:384:zYzuP4tiuOub2WuzvqOFgjexqO5XgYWTIWv/+:sbL+
                                      MD5:C17170262312F3BE7027BC2CA825BF0C
                                      SHA1:F19ECEDA82973239A1FDC5826BCE7691E5DCB4FB
                                      SHA-256:D5E0E8694DDC0548D8E6B87C83D50F4AB85C1DEBADB106D6A6A794C3E746F4FA
                                      SHA-512:C6160FD03AD659C8DD9CF2A83F9FDCD34F2DB4F8F27F33C5AFD52ACED49DFA9CE4909211C221A0479DBBB6E6C985385557C495FC04D3400FF21A0FBBAE42EE7C
                                      Malicious:false
                                      Preview:BM6.......6...(... ...X.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):780
                                      Entropy (8bit):2.332859493676233
                                      Encrypted:false
                                      SSDEEP:6:cL+pZkaHqHgVcKKfF9mHRMMPRGS37LlN/sUQqGUSGeTsdEC:ckmaRVcKKfm2MYS3sUQqGLGeTEV
                                      MD5:383A85EAB6ECDA319BFDDD82416FC6C2
                                      SHA1:2A9324E1D02C3E41582BF5370043D8AFEB02BA6F
                                      SHA-256:079CE1041CBFFE18FF62A2B4A33711EDA40F680D0B1D3B551DB47E39A6390B21
                                      SHA-512:C661E0B3C175D31B365362E52D7B152267A15D59517A4BCC493329BE20B23D0E4EB62D1BA80BB96447EEAF91A6901F4B34BF173B4AB6F90D4111EA97C87C1252
                                      Malicious:false
                                      Preview:...........................................................................................................................C......................................................115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn................gx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;.......................................................................................................................................https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip...........................................................................................................................................................................................................................................
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):47879
                                      Entropy (8bit):4.950611667526586
                                      Encrypted:false
                                      SSDEEP:768:Shef3jHdCG28Eb1tyci8crbEw6/5+3xFkbP0vyzbZrS14e:SheU5De
                                      MD5:95673B0F968C0F55B32204361940D184
                                      SHA1:81E427D15A1A826B93E91C3D2FA65221C8CA9CFF
                                      SHA-256:40B37E7B80CF678D7DD302AAF41B88135ADE6DDF44D89BDBA19CF171564444BD
                                      SHA-512:7601F1883EDBB4150A9DC17084012323B3BFA66F6D19D3D0355CF82B6A1C9DCE475D758DA18B6D17A8B321BF6FCA20915224DBAEDCB3F4D16ABFAF7A5FC21B92
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):54359
                                      Entropy (8bit):5.015093444540877
                                      Encrypted:false
                                      SSDEEP:768:SWjkSFwwlUdcUG2HAmDTzpXtgmDNQ8qD7DHDqMtgDdLDMaDoKMGzD0DWJQ8/QoZ4:SWcwiqDB
                                      MD5:0252D45CA21C8E43C9742285C48E91AD
                                      SHA1:5C14551D2736EEF3A1C1970CC492206E531703C1
                                      SHA-256:845D0E178AEEBD6C7E2A2E9697B2BF6CF02028C50C288B3BA88FE2918EA2834A
                                      SHA-512:1BFCF6C0E7C977D777F12BD20AC347630999C4D99BD706B40DE7FF8F2F52E02560D68093142CC93722095657807A1480CE3FB6A2E000C488550548C497998755
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}..{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}\'b9\'d9\'c5\'c1{\*\falt Batang};}{\f18\fbidi \fmodern\fcharset136\fprq1{\*\panose 02020509000000000000}MingLiU{\*\falt 2OcuAe};}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\f44\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}@\'b9\'d9\'c5\'c1;}..{\f45\fbidi \fmodern\fcharset136\fprq1{\*\panose 02020509000000000000}@MingLiU;}{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}..{\f54\fbidi \fmodern\fchar
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):79346
                                      Entropy (8bit):4.901891087442577
                                      Encrypted:false
                                      SSDEEP:768:SDwtkzjHdLG2xN1fyvnywUKB5lylYlzlJpsbuEWeM/yDRu9uCuwyInIwDOHEhm/v:SDnz5Rt4D4
                                      MD5:2EFC3690D67CD073A9406A25005F7CEA
                                      SHA1:52C07F98870EABACE6EC370B7EB562751E8067E9
                                      SHA-256:5C7F6AD1EC4BC2C8E2C9C126633215DABA7DE731AC8B12BE10CA157417C97F3A
                                      SHA-512:0766C58E64D9CDA5328E00B86F8482316E944AA2C26523A3C37289E22C34BE4B70937033BEBDB217F675E40DB9FECDCE0A0D516F9065A170E28286C2D218487C
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}..{\f11\fbidi \fmodern\fcharset128\fprq1{\*\panose 02020609040205080304}MS Mincho{\*\falt ?l?r ??\'81\'66c};}{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}\'b9\'d9\'c5\'c1{\*\falt Batang};}..{\f18\fbidi \fmodern\fcharset136\fprq1{\*\panose 02020509000000000000}MingLiU{\*\falt 2OcuAe};}{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):39070
                                      Entropy (8bit):5.03796878472628
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdb2YG2+d18Scgn8c8/868H1F8E8/8Z3m8VdAm86a8n:Shef3jHd3G2n+p/mZrS14A
                                      MD5:17194003FA70CE477326CE2F6DEEB270
                                      SHA1:E325988F68D327743926EA317ABB9882F347FA73
                                      SHA-256:3F33734B2D34CCE83936CE99C3494CD845F1D2C02D7F6DA31D42DFC1CA15A171
                                      SHA-512:DCF4CCF0B352A8B271827B3B8E181F7D6502CA0F8C9DDA3DC6E53441BB4AE6E77B49C9C947CC3EDE0BF323F09140A0C068A907F3C23EA2A8495D1AD96820051C
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):40512
                                      Entropy (8bit):5.035949134693175
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdg2yG2gv8n8+8zfB8k8F8i8k1Z8M8I818E838C8A8s:Shef3jHd2G26nyMZrS14g
                                      MD5:537EFEECDFA94CC421E58FD82A58BA9E
                                      SHA1:3609456E16BC16BA447979F3AA69221290EC17D0
                                      SHA-256:5AFA4753AFA048C6D6C39327CE674F27F5F6E5D3F2A060B7A8AED61725481150
                                      SHA-512:E007786FFA09CCD5A24E5C6504C8DE444929A2FAAAFAD3712367C05615B7E1B0FBF7FBFFF7028ED3F832CE226957390D8BF54308870E9ED597948A838DA1137B
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37045
                                      Entropy (8bit):5.028683023706024
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHd02wG2roqni2Jeo75Y3kmA31dv61QyU:Shef3jHd4G2M5bZrS14Q
                                      MD5:2C5A3B81D5C4715B7BEA01033367FCB5
                                      SHA1:B548B45DA8463E17199DAAFD34C23591F94E82CD
                                      SHA-256:A75BB44284B9DB8D702692F84909A7E23F21141866ADF3DB888042E9109A1CB6
                                      SHA-512:490C5A892FAC801B853C348477B1140755D4C53CA05726AC19D3649AF4285C93523393A3667E209C71C80AC06FFD809F62DD69AE65012DCB00445D032F1277B3
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):36987
                                      Entropy (8bit):5.036160205965849
                                      Encrypted:false
                                      SSDEEP:384:Sw3BHSj2cLeT+sPzy3EFHjHdp2oG2/CzhReo75Y3kmA31dv61Qyz:Sw3BHSWjHdBG2/UhsZrS14f
                                      MD5:7A8D499407C6A647C03C4471A67EAAD7
                                      SHA1:D573B6AC8E7E04A05CBBD6B7F6A9842F371D343B
                                      SHA-256:2C95BEF914DA6C50D7BDEDEC601E589FBB4FDA24C4863A7260F4F72BD025799C
                                      SHA-512:608EF3FF0A517FE1E70FF41AEB277821565C5A9BEE5103AA5E45C68D4763FCE507C2A34D810F4CD242D163181F8341D9A69E93FE32ADED6FBC7F544C55743F12
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):36973
                                      Entropy (8bit):5.040611616416892
                                      Encrypted:false
                                      SSDEEP:384:S93BHSj2cguALeT+sPzy3EFHjHdM2EG2YLC7O3eo75Y3kmA31dv61QyW:S93BHSTjHd0G2YLCZrS14y
                                      MD5:FE68C2DC0D2419B38F44D83F2FCF232E
                                      SHA1:6C6E49949957215AA2F3DFB72207D249ADF36283
                                      SHA-256:26FD072FDA6E12F8C2D3292086EF0390785EFA2C556E2A88BD4673102AF703E5
                                      SHA-512:941FA0A1F6A5756ED54260994DB6158A7EBEB9E18B5C8CA2F6530C579BC4455918DF0B38C609F501CA466B3CC067B40E4B861AD6513373B483B36338AE20A810
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhim
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37580
                                      Entropy (8bit):5.0458193216786
                                      Encrypted:false
                                      SSDEEP:384:Sw3BHSj2cLeT+sPzy3EFHjHdi2MG2AGsi6p07i/eo75Y3kmA31dv61QyR:Sw3BHSWjHdGG2Axa7iGZrS14N
                                      MD5:08B9E69B57E4C9B966664F8E1C27AB09
                                      SHA1:2DA1025BBBFB3CD308070765FC0893A48E5A85FA
                                      SHA-256:D8489F8C16318E524B45DE8B35D7E2C3CD8ED4821C136F12F5EF3C9FC3321324
                                      SHA-512:966B5ED68BE6B5CCD46E0DE1FA868CFE5432D9BF82E1E2F6EB99B2AEF3C92F88D96F4F4EEC5E16381B9C6DB80A68071E7124CA1474D664BDD77E1817EC600CB4
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):38377
                                      Entropy (8bit):5.030938473355282
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdg2oG2l1glOmeo75Y3kmA31dv61QyB:Shef3jHdMG2l1AO3ZrS14l
                                      MD5:35C2F97EEA8819B1CAEBD23FEE732D8F
                                      SHA1:E354D1CC43D6A39D9732ADEA5D3B0F57284255D2
                                      SHA-256:1ADFEE058B98206CB4FBE1A46D3ED62A11E1DEE2C7FF521C1EEF7C706E6A700E
                                      SHA-512:908149A6F5238FCCCD86F7C374986D486590A0991EF5243F0CD9E63CC8E208158A9A812665233B09C3A478233D30F21E3D355B94F36B83644795556F147345BF
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):38437
                                      Entropy (8bit):5.031126676607223
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdtW2IG2sjqMeo75Y3kmA31dv61Qyg:Shef3jHd0G2smJZrS14M
                                      MD5:4E57113A6BF6B88FDD32782A4A381274
                                      SHA1:0FCCBC91F0F94453D91670C6794F71348711061D
                                      SHA-256:9BD38110E6523547AED50617DDC77D0920D408FAEED2B7A21AB163FDA22177BC
                                      SHA-512:4F1918A12269C654D44E9D394BC209EF0BC32242BE8833A2FBA437B879125177E149F56F2FB0C302330DEC328139B34982C04B3FEFB045612B6CC9F83EC85AA9
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37181
                                      Entropy (8bit):5.039739267952546
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdN26G2VSA1Ieo75Y3kmA31dv61QyU:Shef3jHdfG2oe1ZrS14w
                                      MD5:3D59BBB5553FE03A89F817819540F469
                                      SHA1:26781D4B06FF704800B463D0F1FCA3AFD923A9FE
                                      SHA-256:2ADC900FAFA9938D85CE53CB793271F37AF40CF499BCC454F44975DB533F0B61
                                      SHA-512:95719AE80589F71209BB3CB953276538040E7111B994D757B0A24283AEFE27AADBBE9EEF3F1F823CE4CABC1090946D4A2A558607AC6CAC6FACA5971529B34DAC
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):49044
                                      Entropy (8bit):4.910095634621579
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdc2oG2WWDFFG5BwKeo75Y3kmA31dv61QyM:Shef3jHdoG2NHG5BwLZrS14Q
                                      MD5:FB4E8718FEA95BB7479727FDE80CB424
                                      SHA1:1088C7653CBA385FE994E9AE34A6595898F20AEB
                                      SHA-256:E13CC9B13AA5074DC45D50379ECEB17EE39A0C2531AB617D93800FE236758CA9
                                      SHA-512:24DB377AF1569E4E2B2EBCCEC42564CEA95A30F1FF43BCAF25A692F99567E027BCEF4AACEF008EC5F64EA2EEF0C04BE88D2B30BCADABB3919B5F45A6633940CB
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37196
                                      Entropy (8bit):5.039268541932758
                                      Encrypted:false
                                      SSDEEP:384:Sw3BHSj2cLeT+sPzy3EFHjHdY2oG2pq32eo75Y3kmA31dv61Qys:Sw3BHSWjHdUG2pq3nZrS14I
                                      MD5:3788F91C694DFC48E12417CE93356B0F
                                      SHA1:EB3B87F7F654B604DAF3484DA9E02CA6C4EA98B7
                                      SHA-256:23E5E738AAD10FB8EF89AA0285269AFF728070080158FD3E7792FE9ED47C51F4
                                      SHA-512:B7DD9E6DC7C2D023FF958CAF132F0544C76FAE3B2D8E49753257676CC541735807B4BEFDF483BCAE94C2DCDE3C878C783B4A89DCA0FECBC78F5BBF7C356F35CD
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):36883
                                      Entropy (8bit):5.028048191734335
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdR2AG2c/EnByeo75Y3kmA31dv61Qy9:Shef3jHdJG2cQZrS14R
                                      MD5:30A200F78498990095B36F574B6E8690
                                      SHA1:C4B1B3C087BD12B063E98BCA464CD05F3F7B7882
                                      SHA-256:49F2C739E7D9745C0834DC817A71BF6676CCC24A4C28DCDDF8844093AAB3DF07
                                      SHA-512:C0DA2AAE82C397F6943A0A7B838F60EEEF8F57192C5F498F2ECF05DB824CFEB6D6CA830BF3715DA7EE400AA8362BD64DC835298F3F0085AE7A744E6E6C690511
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):81844
                                      Entropy (8bit):4.85025787009624
                                      Encrypted:false
                                      SSDEEP:384:SXZ0j2cKKwd1lksPzy3EFHjHdI2MG275rQeo75Y3kmA31dv61Qyr:SXZ0qbjHd4G2RNZrS14P
                                      MD5:B77E1221F7ECD0B5D696CB66CDA1609E
                                      SHA1:51EB7A254A33D05EDF188DED653005DC82DE8A46
                                      SHA-256:7E491E7B48D6E34F916624C1CDA9F024E86FCBEC56ACDA35E27FA99D530D017E
                                      SHA-512:F435FD67954787E6B87460DB026759410FBD25B2F6EA758118749C113A50192446861A114358443A129BE817020B50F21D27B1EBD3D22C7BE62082E8B45223FC
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f11\fbidi \fmodern\fcharset128\fprq1{\*\panose 02020609040205080304}MS Mincho{\*\falt ?l?r ??\'81\'66c};}{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}\'b9\'d9\'c5\'c1{\*\falt Batang};}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f44\fbidi \froman\fcharset129\fprq2{\*\panose 020306000001
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):91501
                                      Entropy (8bit):4.841830504507431
                                      Encrypted:false
                                      SSDEEP:768:Shef3jHdUG2NQcbxfSVZiG9jvi3//ZVrMQr7pEKCHSI2DsY78piTDtTa6BxzBwdY:SheiaDq
                                      MD5:6735CB43FE44832B061EEB3F5956B099
                                      SHA1:D636DAF64D524F81367EA92FDAFA3726C909BEE1
                                      SHA-256:552AA0F82F37C9601114974228D4FC54F7434FE3AE7A276EF1AE98A0F608F1D0
                                      SHA-512:60272801909DBBA21578B22C49F6B0BA8CD0070F116476FF35B3AC8347B987790E4CC0334724244C4B13415A246E77A577230029E4561AE6F04A598C3F536C7E
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):41169
                                      Entropy (8bit):5.030695296195755
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdcqH24G2ZN1EDCv3Apb0WD5gYV/S4L3rnzdeo75Y3f:Shef3jHdcMG2NpZrS14F
                                      MD5:C33AFB4ECC04EE1BCC6975BEA49ABE40
                                      SHA1:FBEA4F170507CDE02B839527EF50B7EC74B4821F
                                      SHA-256:A0356696877F2D94D645AE2DF6CE6B370BD5C0D6DB3D36DEF44E714525DE0536
                                      SHA-512:0D435F0836F61A5FF55B78C02FA47B191E5807A79D8A6E991F3115743DF2141B3DB42BA8BDAD9AD259E12F5800828E9E72D7C94A6A5259312A447D669B03EC44
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37577
                                      Entropy (8bit):5.025836823617116
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdy2MG2D7mgwroXeo75Y3kmA31dv61Qy5:Shef3jHdGG23KrDZrS14N
                                      MD5:FF70CC7C00951084175D12128CE02399
                                      SHA1:75AD3B1AD4FB14813882D88E952208C648F1FD18
                                      SHA-256:CB5DA96B3DFCF4394713623DBF3831B2A0B8BE63987F563E1C32EDEB74CB6C3A
                                      SHA-512:F01DF3256D49325E5EC49FD265AA3F176020C8FFEC60EB1D828C75A3FA18FF8634E1DE824D77DFDD833768ACFF1F547303104620C70066A2708654A07EF22E19
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):39896
                                      Entropy (8bit):5.048541002474746
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdD2SG2gA8w8OJ6868jy8/8w8m8T848f8y858l8j8yv:Shef3jHdxG2KhuZrS14G
                                      MD5:E79D7F2833A9C2E2553C7FE04A1B63F4
                                      SHA1:3D9F56D2381B8FE16042AA7C4FEB1B33F2BAEBFF
                                      SHA-256:519AD66009A6C127400C6C09E079903223BD82ECC18AD71B8E5CD79F5F9C053E
                                      SHA-512:E0159C753491CAC7606A7250F332E87BC6B14876BC7A1CF5625FA56AB4F09C485F7B231DD52E4FF0F5F3C29862AFB1124C0EFD0741613EB97A83CBE2668AF5DE
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37917
                                      Entropy (8bit):5.027872281764284
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdy2QG2xgk5eo75Y3kmA31dv61QyV:Shef3jHdCG2EZrS14p
                                      MD5:FA948F7D8DFB21CEDDD6794F2D56B44F
                                      SHA1:CA915FBE020CAA88DD776D89632D7866F660FC7A
                                      SHA-256:BD9F4B3AEDF4F81F37EC0A028AABCB0E9A900E6B4DE04E9271C8DB81432E2A66
                                      SHA-512:0D211BFB0AE953081DCA00CD07F8C908C174FD6C47A8001FADC614203F0E55D9FBB7FA9B87C735D57101341AB36AF443918EE00737ED4C19ACE0A2B85497F41A
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):52161
                                      Entropy (8bit):4.964306949910696
                                      Encrypted:false
                                      SSDEEP:768:Shef3jHdXG2Cz2/vBAOZsQO0cLfnF/Zhcz7sDsYZBB/0gBjL+IU/hbhMVDtsR49P:ShehlrGR1m4dx9mjVyAvg7ouDT
                                      MD5:313E0ECECD24F4FA1504118A11BC7986
                                      SHA1:E1B9AE804C7FB1D27F39DB18DC0647BB04E75E9D
                                      SHA-256:70C0F32ED379AE899E5AC975E20BBBACD295CF7CD50C36174D2602420C770AC1
                                      SHA-512:C7500363C61BAF8B77FCE796D750F8F5E6886FF0A10F81C3240EA3AD4E5F101B597490DEA8AB6BD9193457D35D8FD579FCE1B88A1C8D85EBE96C66D909630730
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):47108
                                      Entropy (8bit):4.952777691675008
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdg2qG2aUGs0K6lyZqmfGGHRblldORZeo75Y3kmA31L:Shef3jHdeG2lGsDOcZxbP7ZrS14K
                                      MD5:452615DB2336D60AF7E2057481E4CAB5
                                      SHA1:442E31F6556B3D7DE6EB85FBAC3D2957B7F5EAC6
                                      SHA-256:02932052FAFE97E6ACAAF9F391738A3A826F5434B1A013ABBFA7A6C1ADE1E078
                                      SHA-512:7613DC329ABE7A3F32164C9A6B660F209A84B774AB9C008BF6503C76255B30EA9A743A6DC49A8DE8DF0BCB9AEA5A33F7408BA27848D9562583FF51991910911F
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):41391
                                      Entropy (8bit):5.027730966276624
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHd4Yb2YG2gNZ8a8zV/8j8U8l8x838Z8Q808m8d8T8hw:Shef3jHdZvG23AZrS14f
                                      MD5:C911ABA4AB1DA6C28CF86338AB2AB6CC
                                      SHA1:FEE0FD58B8EFE76077620D8ABC7500DBFEF7C5B0
                                      SHA-256:E64178E339C8E10EAC17A236A67B892D0447EB67B1DCD149763DAD6FD9F72729
                                      SHA-512:3491ED285A091A123A1A6D61AAFBB8D5621CCC9E045A237A2F9C2CF6049E7420EB96EF30FDCEA856B50454436E2EC468770F8D585752D73FAFD676C4EF5E800A
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37381
                                      Entropy (8bit):5.02443306661187
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdf24G2/ezV6YQUdZYlujeMQ9RXmhRweo75Y3kmA31S:Shef3jHdrG2fuhZrS14T
                                      MD5:8D61648D34CBA8AE9D1E2A219019ADD1
                                      SHA1:2091E42FC17A0CC2F235650F7AAD87ABF8BA22C2
                                      SHA-256:72F20024B2F69B45A1391F0A6474E9F6349625CE329F5444AEC7401FE31F8DE1
                                      SHA-512:68489C33BA89EDFE2E3AEBAACF8EF848D2EA88DCBEF9609C258662605E02D12CFA4FFDC1D266FC5878488E296D2848B2CB0BBD45F1E86EF959BAB6162D284079
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):38483
                                      Entropy (8bit):5.022972736625151
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdb24G2ZKLVdDeo75Y3kmA31dv61QyE:Shef3jHd/G2w6ZrS14w
                                      MD5:C7A19984EB9F37198652EAF2FD1EE25C
                                      SHA1:06EAFED025CF8C4D76966BF382AB0C5E1BD6A0AE
                                      SHA-256:146F61DB72297C9C0FACFFD560487F8D6A2846ECEC92ECC7DB19C8D618DBC3A4
                                      SHA-512:43DD159F9C2EAC147CBFF1DDA83F6A83DD0C59D2D7ACAC35BA8B407A04EC9A1110A6A8737535D060D100EDE1CB75078CF742C383948C9D4037EF459D150F6020
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):42582
                                      Entropy (8bit):5.010722377068833
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHds42WG2mzGu/eo75Y3kmA31dv61QyZ:Shef3jHdsiG2moZrS149
                                      MD5:531BA6B1A5460FC9446946F91CC8C94B
                                      SHA1:CC56978681BD546FD82D87926B5D9905C92A5803
                                      SHA-256:6DB650836D64350BBDE2AB324407B8E474FC041098C41ECAC6FD77D632A36415
                                      SHA-512:EF25C3CF4343DF85954114F59933C7CC8107266C8BCAC3B5EA7718EB74DBEE8CA8A02DA39057E6EF26B64F1DFCCD720DD3BF473F5AE340BA56941E87D6B796C9
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):93778
                                      Entropy (8bit):4.76206134900188
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdW2YG22cViQj3KiG8dpcH8iEriG8E8O83Jz52sxG8h:Shef3jHdWG2+oPZrS14i
                                      MD5:8419BE28A0DCEC3F55823620922B00FA
                                      SHA1:2E4791F9CDFCA8ABF345D606F313D22B36C46B92
                                      SHA-256:1F21838B244C80F8BED6F6977AA8A557B419CF22BA35B1FD4BF0F98989C5BDF8
                                      SHA-512:8FCA77E54480AEA3C0C7A705263ED8FB83C58974F5F0F62F12CC97C8E0506BA2CDB59B70E59E9A6C44DD7CDE6ADEEEC35B494D31A6A146FF5BA7006136AB9386
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):864
                                      Entropy (8bit):4.5335184780121995
                                      Encrypted:false
                                      SSDEEP:24:ptrPzDVR5Gi3OzGm0Ei5bnBR7brW8PNAi0eEprY+Ai75wRZce/:DZD36W5/vWmMo+m
                                      MD5:3E0020FC529B1C2A061016DD2469BA96
                                      SHA1:C3A91C22B63F6FE709E7C29CAFB29A2EE83E6ADE
                                      SHA-256:402751FA49E0CB68FE052CB3DB87B05E71C1D950984D339940CF6B29409F2A7C
                                      SHA-512:5CA3C134201ED39D96D72911C0498BAE6F98701513FD7F1DC8512819B673F0EA580510FA94ED9413CCC73DA18B39903772A7CBFA3478176181CEE68C896E14CF
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: WannaCry_RansomNote, Description: Detects WannaCry Ransomware Note, Source: C:\ProgramData\dsvqhifq359\r.wnry, Author: Florian Roth
                                      Preview:Q: What's wrong with my files?....A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted... If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely!.. Let's start decrypting!....Q: What do I do?....A: First, you need to pay service fees for the decryption... Please send %s to this bitcoin address: %s.... Next, please find an application file named "%s". It is the decrypt software... Run and follow the instructions! (You may need to disable your antivirus for a while.).. ..Q: How can I trust?....A: Don't worry about decryption... We will decrypt your files surely because nobody will trust us if we cheat users... ....* If you need our assistance, send a message by clicking <Contact Us> on the decryptor window...
                                      Process:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                      Category:dropped
                                      Size (bytes):2752512
                                      Entropy (8bit):7.9983596446162535
                                      Encrypted:true
                                      SSDEEP:49152:zUx4db9A1iRdHAHZXaTnCshuTnSQYUB/UZfCg2clOQin2h37l2Jh93:z/b96AdHA5XaTJvQYUBBgRlJi+rl4
                                      MD5:23BE438907AAF12146646F32E399D494
                                      SHA1:8785F329B80C05714FB38880DABC7B3F908BA027
                                      SHA-256:2E335B26D70EA21BAE79E936DA29EC35E91685C5ACFC86966E21ACEC4C36E227
                                      SHA-512:5F421A75C381314A0F658F42D88E18A3897B420EDA41F8A2EF167CDB3B5A50C1043FB396573863376D2107B03EDC997E9907CCBE6919379057F78CF26AC68A3B
                                      Malicious:false
                                      Preview:PK..........!(................Data/PK........M..J................Data/Tor/PK..........!(................Tor/PK..........!(..t.......0.....Tor/libeay32.dll.:.t.e....6m.....Me.Vjil....!..E..T..e...*..e....,.c..o=..t.u..,....J..k-.x.V..:1u....v..7.L~..?{..rN23.w......o..N2....WU..G..G.......Ed..7..q.o.5.]w.{...wl\y..m..w...?]......n......Z]UX./h4.....]...71....e.\^1..I..MH5...k.o+..s...c|s....-#d,!..............eW...?a.......R..I..R......w.....m..#od.*q.&..g.;.C(..t.V...j.Jq%...d_.Js...Hk.j#...DH.....,8_.O...]U....t .......ks:..T...18.C.%ASZJ3.U.nl..J.@)...$...N.s.O........m.0..*e..4.....m...lI..Z..7.f-.?....;...?.SO....}..7#.L8...5.z.~.........E.S..1....7.*.0...pf.....jz.)..Y..8..^....B........p.W..r..B.....p..?......../`*Wl..D.xAi..$..d.......&..p. ..bOtE.\.......(..&A...6v..S..Q...L...3 .:.6.m7.'.......)......iH.NZ_t.;./.a..n.g...A`.T.k.........."...<.rt..3....0.{N..yy...p.z.=..#.u.u...d......mQ..*.H..2.N.BRSN...XC....).".@.._.18.&...n
                                      Process:C:\Windows\tasksche.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3514368
                                      Entropy (8bit):7.777724762407647
                                      Encrypted:false
                                      SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8s3x:QqPe1Cxcxk3ZAEUadzR8sB
                                      MD5:79409B6F48460807480E4A574312D85F
                                      SHA1:5D9F64CCF13081441F2785A535E02312236445D9
                                      SHA-256:331E14A6594B700B6167690430C9DA72FEE72D408DD1B8C5CB155C0199033D0A
                                      SHA-512:AC004B3248CBC2CE7B6D566E3F5128195669E5C53C24AE13668E37FDADCB5158CC345D7A33CADFED6328A25A640C5FA612D0F0DB86989C3ACC21771B55508916
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: us-cert code analysis team
                                      • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: ReversingLabs
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 93%
                                      Joe Sandbox View:
                                      • Filename: 542CxvZnI5.dll, Detection: malicious, Browse
                                      • Filename: UR9TBr66am.dll, Detection: malicious, Browse
                                      • Filename: eAx3JV2z84.dll, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\mssecsvc.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3514368
                                      Entropy (8bit):7.777724762407647
                                      Encrypted:false
                                      SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8s3x:QqPe1Cxcxk3ZAEUadzR8sB
                                      MD5:79409B6F48460807480E4A574312D85F
                                      SHA1:5D9F64CCF13081441F2785A535E02312236445D9
                                      SHA-256:331E14A6594B700B6167690430C9DA72FEE72D408DD1B8C5CB155C0199033D0A
                                      SHA-512:AC004B3248CBC2CE7B6D566E3F5128195669E5C53C24AE13668E37FDADCB5158CC345D7A33CADFED6328A25A640C5FA612D0F0DB86989C3ACC21771B55508916
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 93%
                                      Joe Sandbox View:
                                      • Filename: 542CxvZnI5.dll, Detection: malicious, Browse
                                      • Filename: UR9TBr66am.dll, Detection: malicious, Browse
                                      • Filename: eAx3JV2z84.dll, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\tasksche.exe
                                      File Type:PC bitmap, Windows 3.x format, 800 x 600 x 24, image size 1440000, resolution 3779 x 3779 px/m, cbSize 1440054, bits offset 54
                                      Category:dropped
                                      Size (bytes):1440054
                                      Entropy (8bit):0.3363393123555661
                                      Encrypted:false
                                      SSDEEP:384:zYzuP4tiuOub2WuzvqOFgjexqO5XgYWTIWv/+:sbL+
                                      MD5:C17170262312F3BE7027BC2CA825BF0C
                                      SHA1:F19ECEDA82973239A1FDC5826BCE7691E5DCB4FB
                                      SHA-256:D5E0E8694DDC0548D8E6B87C83D50F4AB85C1DEBADB106D6A6A794C3E746F4FA
                                      SHA-512:C6160FD03AD659C8DD9CF2A83F9FDCD34F2DB4F8F27F33C5AFD52ACED49DFA9CE4909211C221A0479DBBB6E6C985385557C495FC04D3400FF21A0FBBAE42EE7C
                                      Malicious:false
                                      Preview:BM6.......6...(... ...X.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\tasksche.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):780
                                      Entropy (8bit):2.332859493676233
                                      Encrypted:false
                                      SSDEEP:6:cL+pZkaHqHgVcKKfF9mHRMMPRGS37LlN/sUQqGUSGeTsdEC:ckmaRVcKKfm2MYS3sUQqGLGeTEV
                                      MD5:383A85EAB6ECDA319BFDDD82416FC6C2
                                      SHA1:2A9324E1D02C3E41582BF5370043D8AFEB02BA6F
                                      SHA-256:079CE1041CBFFE18FF62A2B4A33711EDA40F680D0B1D3B551DB47E39A6390B21
                                      SHA-512:C661E0B3C175D31B365362E52D7B152267A15D59517A4BCC493329BE20B23D0E4EB62D1BA80BB96447EEAF91A6901F4B34BF173B4AB6F90D4111EA97C87C1252
                                      Malicious:false
                                      Preview:...........................................................................................................................C......................................................115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn................gx7ekbenv2riucmf.onion;57g7spgrzlojinas.onion;xxlvbrloxvriy2c5.onion;76jdd2ir2embyv47.onion;cwwnhwhlz52maqm7.onion;.......................................................................................................................................https://dist.torproject.org/torbrowser/6.5.1/tor-win32-0.2.9.10.zip...........................................................................................................................................................................................................................................
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):47879
                                      Entropy (8bit):4.950611667526586
                                      Encrypted:false
                                      SSDEEP:768:Shef3jHdCG28Eb1tyci8crbEw6/5+3xFkbP0vyzbZrS14e:SheU5De
                                      MD5:95673B0F968C0F55B32204361940D184
                                      SHA1:81E427D15A1A826B93E91C3D2FA65221C8CA9CFF
                                      SHA-256:40B37E7B80CF678D7DD302AAF41B88135ADE6DDF44D89BDBA19CF171564444BD
                                      SHA-512:7601F1883EDBB4150A9DC17084012323B3BFA66F6D19D3D0355CF82B6A1C9DCE475D758DA18B6D17A8B321BF6FCA20915224DBAEDCB3F4D16ABFAF7A5FC21B92
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):54359
                                      Entropy (8bit):5.015093444540877
                                      Encrypted:false
                                      SSDEEP:768:SWjkSFwwlUdcUG2HAmDTzpXtgmDNQ8qD7DHDqMtgDdLDMaDoKMGzD0DWJQ8/QoZ4:SWcwiqDB
                                      MD5:0252D45CA21C8E43C9742285C48E91AD
                                      SHA1:5C14551D2736EEF3A1C1970CC492206E531703C1
                                      SHA-256:845D0E178AEEBD6C7E2A2E9697B2BF6CF02028C50C288B3BA88FE2918EA2834A
                                      SHA-512:1BFCF6C0E7C977D777F12BD20AC347630999C4D99BD706B40DE7FF8F2F52E02560D68093142CC93722095657807A1480CE3FB6A2E000C488550548C497998755
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}..{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}\'b9\'d9\'c5\'c1{\*\falt Batang};}{\f18\fbidi \fmodern\fcharset136\fprq1{\*\panose 02020509000000000000}MingLiU{\*\falt 2OcuAe};}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\f44\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}@\'b9\'d9\'c5\'c1;}..{\f45\fbidi \fmodern\fcharset136\fprq1{\*\panose 02020509000000000000}@MingLiU;}{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}..{\f54\fbidi \fmodern\fchar
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):79346
                                      Entropy (8bit):4.901891087442577
                                      Encrypted:false
                                      SSDEEP:768:SDwtkzjHdLG2xN1fyvnywUKB5lylYlzlJpsbuEWeM/yDRu9uCuwyInIwDOHEhm/v:SDnz5Rt4D4
                                      MD5:2EFC3690D67CD073A9406A25005F7CEA
                                      SHA1:52C07F98870EABACE6EC370B7EB562751E8067E9
                                      SHA-256:5C7F6AD1EC4BC2C8E2C9C126633215DABA7DE731AC8B12BE10CA157417C97F3A
                                      SHA-512:0766C58E64D9CDA5328E00B86F8482316E944AA2C26523A3C37289E22C34BE4B70937033BEBDB217F675E40DB9FECDCE0A0D516F9065A170E28286C2D218487C
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}..{\f11\fbidi \fmodern\fcharset128\fprq1{\*\panose 02020609040205080304}MS Mincho{\*\falt ?l?r ??\'81\'66c};}{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}\'b9\'d9\'c5\'c1{\*\falt Batang};}..{\f18\fbidi \fmodern\fcharset136\fprq1{\*\panose 02020509000000000000}MingLiU{\*\falt 2OcuAe};}{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):39070
                                      Entropy (8bit):5.03796878472628
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdb2YG2+d18Scgn8c8/868H1F8E8/8Z3m8VdAm86a8n:Shef3jHd3G2n+p/mZrS14A
                                      MD5:17194003FA70CE477326CE2F6DEEB270
                                      SHA1:E325988F68D327743926EA317ABB9882F347FA73
                                      SHA-256:3F33734B2D34CCE83936CE99C3494CD845F1D2C02D7F6DA31D42DFC1CA15A171
                                      SHA-512:DCF4CCF0B352A8B271827B3B8E181F7D6502CA0F8C9DDA3DC6E53441BB4AE6E77B49C9C947CC3EDE0BF323F09140A0C068A907F3C23EA2A8495D1AD96820051C
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):40512
                                      Entropy (8bit):5.035949134693175
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdg2yG2gv8n8+8zfB8k8F8i8k1Z8M8I818E838C8A8s:Shef3jHd2G26nyMZrS14g
                                      MD5:537EFEECDFA94CC421E58FD82A58BA9E
                                      SHA1:3609456E16BC16BA447979F3AA69221290EC17D0
                                      SHA-256:5AFA4753AFA048C6D6C39327CE674F27F5F6E5D3F2A060B7A8AED61725481150
                                      SHA-512:E007786FFA09CCD5A24E5C6504C8DE444929A2FAAAFAD3712367C05615B7E1B0FBF7FBFFF7028ED3F832CE226957390D8BF54308870E9ED597948A838DA1137B
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37045
                                      Entropy (8bit):5.028683023706024
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHd02wG2roqni2Jeo75Y3kmA31dv61QyU:Shef3jHd4G2M5bZrS14Q
                                      MD5:2C5A3B81D5C4715B7BEA01033367FCB5
                                      SHA1:B548B45DA8463E17199DAAFD34C23591F94E82CD
                                      SHA-256:A75BB44284B9DB8D702692F84909A7E23F21141866ADF3DB888042E9109A1CB6
                                      SHA-512:490C5A892FAC801B853C348477B1140755D4C53CA05726AC19D3649AF4285C93523393A3667E209C71C80AC06FFD809F62DD69AE65012DCB00445D032F1277B3
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):36987
                                      Entropy (8bit):5.036160205965849
                                      Encrypted:false
                                      SSDEEP:384:Sw3BHSj2cLeT+sPzy3EFHjHdp2oG2/CzhReo75Y3kmA31dv61Qyz:Sw3BHSWjHdBG2/UhsZrS14f
                                      MD5:7A8D499407C6A647C03C4471A67EAAD7
                                      SHA1:D573B6AC8E7E04A05CBBD6B7F6A9842F371D343B
                                      SHA-256:2C95BEF914DA6C50D7BDEDEC601E589FBB4FDA24C4863A7260F4F72BD025799C
                                      SHA-512:608EF3FF0A517FE1E70FF41AEB277821565C5A9BEE5103AA5E45C68D4763FCE507C2A34D810F4CD242D163181F8341D9A69E93FE32ADED6FBC7F544C55743F12
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):36973
                                      Entropy (8bit):5.040611616416892
                                      Encrypted:false
                                      SSDEEP:384:S93BHSj2cguALeT+sPzy3EFHjHdM2EG2YLC7O3eo75Y3kmA31dv61QyW:S93BHSTjHd0G2YLCZrS14y
                                      MD5:FE68C2DC0D2419B38F44D83F2FCF232E
                                      SHA1:6C6E49949957215AA2F3DFB72207D249ADF36283
                                      SHA-256:26FD072FDA6E12F8C2D3292086EF0390785EFA2C556E2A88BD4673102AF703E5
                                      SHA-512:941FA0A1F6A5756ED54260994DB6158A7EBEB9E18B5C8CA2F6530C579BC4455918DF0B38C609F501CA466B3CC067B40E4B861AD6513373B483B36338AE20A810
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhim
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37580
                                      Entropy (8bit):5.0458193216786
                                      Encrypted:false
                                      SSDEEP:384:Sw3BHSj2cLeT+sPzy3EFHjHdi2MG2AGsi6p07i/eo75Y3kmA31dv61QyR:Sw3BHSWjHdGG2Axa7iGZrS14N
                                      MD5:08B9E69B57E4C9B966664F8E1C27AB09
                                      SHA1:2DA1025BBBFB3CD308070765FC0893A48E5A85FA
                                      SHA-256:D8489F8C16318E524B45DE8B35D7E2C3CD8ED4821C136F12F5EF3C9FC3321324
                                      SHA-512:966B5ED68BE6B5CCD46E0DE1FA868CFE5432D9BF82E1E2F6EB99B2AEF3C92F88D96F4F4EEC5E16381B9C6DB80A68071E7124CA1474D664BDD77E1817EC600CB4
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):38377
                                      Entropy (8bit):5.030938473355282
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdg2oG2l1glOmeo75Y3kmA31dv61QyB:Shef3jHdMG2l1AO3ZrS14l
                                      MD5:35C2F97EEA8819B1CAEBD23FEE732D8F
                                      SHA1:E354D1CC43D6A39D9732ADEA5D3B0F57284255D2
                                      SHA-256:1ADFEE058B98206CB4FBE1A46D3ED62A11E1DEE2C7FF521C1EEF7C706E6A700E
                                      SHA-512:908149A6F5238FCCCD86F7C374986D486590A0991EF5243F0CD9E63CC8E208158A9A812665233B09C3A478233D30F21E3D355B94F36B83644795556F147345BF
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):38437
                                      Entropy (8bit):5.031126676607223
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdtW2IG2sjqMeo75Y3kmA31dv61Qyg:Shef3jHd0G2smJZrS14M
                                      MD5:4E57113A6BF6B88FDD32782A4A381274
                                      SHA1:0FCCBC91F0F94453D91670C6794F71348711061D
                                      SHA-256:9BD38110E6523547AED50617DDC77D0920D408FAEED2B7A21AB163FDA22177BC
                                      SHA-512:4F1918A12269C654D44E9D394BC209EF0BC32242BE8833A2FBA437B879125177E149F56F2FB0C302330DEC328139B34982C04B3FEFB045612B6CC9F83EC85AA9
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37181
                                      Entropy (8bit):5.039739267952546
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdN26G2VSA1Ieo75Y3kmA31dv61QyU:Shef3jHdfG2oe1ZrS14w
                                      MD5:3D59BBB5553FE03A89F817819540F469
                                      SHA1:26781D4B06FF704800B463D0F1FCA3AFD923A9FE
                                      SHA-256:2ADC900FAFA9938D85CE53CB793271F37AF40CF499BCC454F44975DB533F0B61
                                      SHA-512:95719AE80589F71209BB3CB953276538040E7111B994D757B0A24283AEFE27AADBBE9EEF3F1F823CE4CABC1090946D4A2A558607AC6CAC6FACA5971529B34DAC
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):49044
                                      Entropy (8bit):4.910095634621579
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdc2oG2WWDFFG5BwKeo75Y3kmA31dv61QyM:Shef3jHdoG2NHG5BwLZrS14Q
                                      MD5:FB4E8718FEA95BB7479727FDE80CB424
                                      SHA1:1088C7653CBA385FE994E9AE34A6595898F20AEB
                                      SHA-256:E13CC9B13AA5074DC45D50379ECEB17EE39A0C2531AB617D93800FE236758CA9
                                      SHA-512:24DB377AF1569E4E2B2EBCCEC42564CEA95A30F1FF43BCAF25A692F99567E027BCEF4AACEF008EC5F64EA2EEF0C04BE88D2B30BCADABB3919B5F45A6633940CB
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37196
                                      Entropy (8bit):5.039268541932758
                                      Encrypted:false
                                      SSDEEP:384:Sw3BHSj2cLeT+sPzy3EFHjHdY2oG2pq32eo75Y3kmA31dv61Qys:Sw3BHSWjHdUG2pq3nZrS14I
                                      MD5:3788F91C694DFC48E12417CE93356B0F
                                      SHA1:EB3B87F7F654B604DAF3484DA9E02CA6C4EA98B7
                                      SHA-256:23E5E738AAD10FB8EF89AA0285269AFF728070080158FD3E7792FE9ED47C51F4
                                      SHA-512:B7DD9E6DC7C2D023FF958CAF132F0544C76FAE3B2D8E49753257676CC541735807B4BEFDF483BCAE94C2DCDE3C878C783B4A89DCA0FECBC78F5BBF7C356F35CD
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f53\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}\'b1\'bc\'b8\'b2\'c3\'bc;}{\f54\fbidi \fmodern\fcharset129\fprq1{\*\panose 020b0609000101010101}@\'b1\'bc\'b8\'b2\'c3\'bc;}..{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):36883
                                      Entropy (8bit):5.028048191734335
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdR2AG2c/EnByeo75Y3kmA31dv61Qy9:Shef3jHdJG2cQZrS14R
                                      MD5:30A200F78498990095B36F574B6E8690
                                      SHA1:C4B1B3C087BD12B063E98BCA464CD05F3F7B7882
                                      SHA-256:49F2C739E7D9745C0834DC817A71BF6676CCC24A4C28DCDDF8844093AAB3DF07
                                      SHA-512:C0DA2AAE82C397F6943A0A7B838F60EEEF8F57192C5F498F2ECF05DB824CFEB6D6CA830BF3715DA7EE400AA8362BD64DC835298F3F0085AE7A744E6E6C690511
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):81844
                                      Entropy (8bit):4.85025787009624
                                      Encrypted:false
                                      SSDEEP:384:SXZ0j2cKKwd1lksPzy3EFHjHdI2MG275rQeo75Y3kmA31dv61Qyr:SXZ0qbjHd4G2RNZrS14P
                                      MD5:B77E1221F7ECD0B5D696CB66CDA1609E
                                      SHA1:51EB7A254A33D05EDF188DED653005DC82DE8A46
                                      SHA-256:7E491E7B48D6E34F916624C1CDA9F024E86FCBEC56ACDA35E27FA99D530D017E
                                      SHA-512:F435FD67954787E6B87460DB026759410FBD25B2F6EA758118749C113A50192446861A114358443A129BE817020B50F21D27B1EBD3D22C7BE62082E8B45223FC
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f11\fbidi \fmodern\fcharset128\fprq1{\*\panose 02020609040205080304}MS Mincho{\*\falt ?l?r ??\'81\'66c};}{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}\'b9\'d9\'c5\'c1{\*\falt Batang};}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}..{\f44\fbidi \froman\fcharset129\fprq2{\*\panose 020306000001
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):91501
                                      Entropy (8bit):4.841830504507431
                                      Encrypted:false
                                      SSDEEP:768:Shef3jHdUG2NQcbxfSVZiG9jvi3//ZVrMQr7pEKCHSI2DsY78piTDtTa6BxzBwdY:SheiaDq
                                      MD5:6735CB43FE44832B061EEB3F5956B099
                                      SHA1:D636DAF64D524F81367EA92FDAFA3726C909BEE1
                                      SHA-256:552AA0F82F37C9601114974228D4FC54F7434FE3AE7A276EF1AE98A0F608F1D0
                                      SHA-512:60272801909DBBA21578B22C49F6B0BA8CD0070F116476FF35B3AC8347B987790E4CC0334724244C4B13415A246E77A577230029E4561AE6F04A598C3F536C7E
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):41169
                                      Entropy (8bit):5.030695296195755
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdcqH24G2ZN1EDCv3Apb0WD5gYV/S4L3rnzdeo75Y3f:Shef3jHdcMG2NpZrS14F
                                      MD5:C33AFB4ECC04EE1BCC6975BEA49ABE40
                                      SHA1:FBEA4F170507CDE02B839527EF50B7EC74B4821F
                                      SHA-256:A0356696877F2D94D645AE2DF6CE6B370BD5C0D6DB3D36DEF44E714525DE0536
                                      SHA-512:0D435F0836F61A5FF55B78C02FA47B191E5807A79D8A6E991F3115743DF2141B3DB42BA8BDAD9AD259E12F5800828E9E72D7C94A6A5259312A447D669B03EC44
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37577
                                      Entropy (8bit):5.025836823617116
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdy2MG2D7mgwroXeo75Y3kmA31dv61Qy5:Shef3jHdGG23KrDZrS14N
                                      MD5:FF70CC7C00951084175D12128CE02399
                                      SHA1:75AD3B1AD4FB14813882D88E952208C648F1FD18
                                      SHA-256:CB5DA96B3DFCF4394713623DBF3831B2A0B8BE63987F563E1C32EDEB74CB6C3A
                                      SHA-512:F01DF3256D49325E5EC49FD265AA3F176020C8FFEC60EB1D828C75A3FA18FF8634E1DE824D77DFDD833768ACFF1F547303104620C70066A2708654A07EF22E19
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):39896
                                      Entropy (8bit):5.048541002474746
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdD2SG2gA8w8OJ6868jy8/8w8m8T848f8y858l8j8yv:Shef3jHdxG2KhuZrS14G
                                      MD5:E79D7F2833A9C2E2553C7FE04A1B63F4
                                      SHA1:3D9F56D2381B8FE16042AA7C4FEB1B33F2BAEBFF
                                      SHA-256:519AD66009A6C127400C6C09E079903223BD82ECC18AD71B8E5CD79F5F9C053E
                                      SHA-512:E0159C753491CAC7606A7250F332E87BC6B14876BC7A1CF5625FA56AB4F09C485F7B231DD52E4FF0F5F3C29862AFB1124C0EFD0741613EB97A83CBE2668AF5DE
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37917
                                      Entropy (8bit):5.027872281764284
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdy2QG2xgk5eo75Y3kmA31dv61QyV:Shef3jHdCG2EZrS14p
                                      MD5:FA948F7D8DFB21CEDDD6794F2D56B44F
                                      SHA1:CA915FBE020CAA88DD776D89632D7866F660FC7A
                                      SHA-256:BD9F4B3AEDF4F81F37EC0A028AABCB0E9A900E6B4DE04E9271C8DB81432E2A66
                                      SHA-512:0D211BFB0AE953081DCA00CD07F8C908C174FD6C47A8001FADC614203F0E55D9FBB7FA9B87C735D57101341AB36AF443918EE00737ED4C19ACE0A2B85497F41A
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):52161
                                      Entropy (8bit):4.964306949910696
                                      Encrypted:false
                                      SSDEEP:768:Shef3jHdXG2Cz2/vBAOZsQO0cLfnF/Zhcz7sDsYZBB/0gBjL+IU/hbhMVDtsR49P:ShehlrGR1m4dx9mjVyAvg7ouDT
                                      MD5:313E0ECECD24F4FA1504118A11BC7986
                                      SHA1:E1B9AE804C7FB1D27F39DB18DC0647BB04E75E9D
                                      SHA-256:70C0F32ED379AE899E5AC975E20BBBACD295CF7CD50C36174D2602420C770AC1
                                      SHA-512:C7500363C61BAF8B77FCE796D750F8F5E6886FF0A10F81C3240EA3AD4E5F101B597490DEA8AB6BD9193457D35D8FD579FCE1B88A1C8D85EBE96C66D909630730
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):47108
                                      Entropy (8bit):4.952777691675008
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdg2qG2aUGs0K6lyZqmfGGHRblldORZeo75Y3kmA31L:Shef3jHdeG2lGsDOcZxbP7ZrS14K
                                      MD5:452615DB2336D60AF7E2057481E4CAB5
                                      SHA1:442E31F6556B3D7DE6EB85FBAC3D2957B7F5EAC6
                                      SHA-256:02932052FAFE97E6ACAAF9F391738A3A826F5434B1A013ABBFA7A6C1ADE1E078
                                      SHA-512:7613DC329ABE7A3F32164C9A6B660F209A84B774AB9C008BF6503C76255B30EA9A743A6DC49A8DE8DF0BCB9AEA5A33F7408BA27848D9562583FF51991910911F
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):41391
                                      Entropy (8bit):5.027730966276624
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHd4Yb2YG2gNZ8a8zV/8j8U8l8x838Z8Q808m8d8T8hw:Shef3jHdZvG23AZrS14f
                                      MD5:C911ABA4AB1DA6C28CF86338AB2AB6CC
                                      SHA1:FEE0FD58B8EFE76077620D8ABC7500DBFEF7C5B0
                                      SHA-256:E64178E339C8E10EAC17A236A67B892D0447EB67B1DCD149763DAD6FD9F72729
                                      SHA-512:3491ED285A091A123A1A6D61AAFBB8D5621CCC9E045A237A2F9C2CF6049E7420EB96EF30FDCEA856B50454436E2EC468770F8D585752D73FAFD676C4EF5E800A
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):37381
                                      Entropy (8bit):5.02443306661187
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdf24G2/ezV6YQUdZYlujeMQ9RXmhRweo75Y3kmA31S:Shef3jHdrG2fuhZrS14T
                                      MD5:8D61648D34CBA8AE9D1E2A219019ADD1
                                      SHA1:2091E42FC17A0CC2F235650F7AAD87ABF8BA22C2
                                      SHA-256:72F20024B2F69B45A1391F0A6474E9F6349625CE329F5444AEC7401FE31F8DE1
                                      SHA-512:68489C33BA89EDFE2E3AEBAACF8EF848D2EA88DCBEF9609C258662605E02D12CFA4FFDC1D266FC5878488E296D2848B2CB0BBD45F1E86EF959BAB6162D284079
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):38483
                                      Entropy (8bit):5.022972736625151
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdb24G2ZKLVdDeo75Y3kmA31dv61QyE:Shef3jHd/G2w6ZrS14w
                                      MD5:C7A19984EB9F37198652EAF2FD1EE25C
                                      SHA1:06EAFED025CF8C4D76966BF382AB0C5E1BD6A0AE
                                      SHA-256:146F61DB72297C9C0FACFFD560487F8D6A2846ECEC92ECC7DB19C8D618DBC3A4
                                      SHA-512:43DD159F9C2EAC147CBFF1DDA83F6A83DD0C59D2D7ACAC35BA8B407A04EC9A1110A6A8737535D060D100EDE1CB75078CF742C383948C9D4037EF459D150F6020
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):42582
                                      Entropy (8bit):5.010722377068833
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHds42WG2mzGu/eo75Y3kmA31dv61QyZ:Shef3jHdsiG2moZrS149
                                      MD5:531BA6B1A5460FC9446946F91CC8C94B
                                      SHA1:CC56978681BD546FD82D87926B5D9905C92A5803
                                      SHA-256:6DB650836D64350BBDE2AB324407B8E474FC041098C41ECAC6FD77D632A36415
                                      SHA-512:EF25C3CF4343DF85954114F59933C7CC8107266C8BCAC3B5EA7718EB74DBEE8CA8A02DA39057E6EF26B64F1DFCCD720DD3BF473F5AE340BA56941E87D6B796C9
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                      Category:dropped
                                      Size (bytes):93778
                                      Entropy (8bit):4.76206134900188
                                      Encrypted:false
                                      SSDEEP:384:SheftipUENLFsPzy3EFHjHdW2YG22cViQj3KiG8dpcH8iEriG8E8O83Jz52sxG8h:Shef3jHdWG2+oPZrS14i
                                      MD5:8419BE28A0DCEC3F55823620922B00FA
                                      SHA1:2E4791F9CDFCA8ABF345D606F313D22B36C46B92
                                      SHA-256:1F21838B244C80F8BED6F6977AA8A557B419CF22BA35B1FD4BF0F98989C5BDF8
                                      SHA-512:8FCA77E54480AEA3C0C7A705263ED8FB83C58974F5F0F62F12CC97C8E0506BA2CDB59B70E59E9A6C44DD7CDE6ADEEEC35B494D31A6A146FF5BA7006136AB9386
                                      Malicious:false
                                      Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc2\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1042\themelang1033\themelangfe1042\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}..{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f36\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f37\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}{\f40\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}@\'b8\'bc\'c0\'ba \'b0\'ed\'b5\'f1;}..{\f41\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \fmodern\fcharset129\fprq2{\*\panose 020b0503020000020004}\'b8\'bc\'c0\'ba
                                      Process:C:\Windows\tasksche.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):864
                                      Entropy (8bit):4.5335184780121995
                                      Encrypted:false
                                      SSDEEP:24:ptrPzDVR5Gi3OzGm0Ei5bnBR7brW8PNAi0eEprY+Ai75wRZce/:DZD36W5/vWmMo+m
                                      MD5:3E0020FC529B1C2A061016DD2469BA96
                                      SHA1:C3A91C22B63F6FE709E7C29CAFB29A2EE83E6ADE
                                      SHA-256:402751FA49E0CB68FE052CB3DB87B05E71C1D950984D339940CF6B29409F2A7C
                                      SHA-512:5CA3C134201ED39D96D72911C0498BAE6F98701513FD7F1DC8512819B673F0EA580510FA94ED9413CCC73DA18B39903772A7CBFA3478176181CEE68C896E14CF
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: WannaCry_RansomNote, Description: Detects WannaCry Ransomware Note, Source: C:\Windows\r.wnry, Author: Florian Roth
                                      Preview:Q: What's wrong with my files?....A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted... If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely!.. Let's start decrypting!....Q: What do I do?....A: First, you need to pay service fees for the decryption... Please send %s to this bitcoin address: %s.... Next, please find an application file named "%s". It is the decrypt software... Run and follow the instructions! (You may need to disable your antivirus for a while.).. ..Q: How can I trust?....A: Don't worry about decryption... We will decrypt your files surely because nobody will trust us if we cheat users... ....* If you need our assistance, send a message by clicking <Contact Us> on the decryptor window...
                                      Process:C:\Windows\tasksche.exe
                                      File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                      Category:dropped
                                      Size (bytes):2752512
                                      Entropy (8bit):7.9983596446162535
                                      Encrypted:true
                                      SSDEEP:49152:zUx4db9A1iRdHAHZXaTnCshuTnSQYUB/UZfCg2clOQin2h37l2Jh93:z/b96AdHA5XaTJvQYUBBgRlJi+rl4
                                      MD5:23BE438907AAF12146646F32E399D494
                                      SHA1:8785F329B80C05714FB38880DABC7B3F908BA027
                                      SHA-256:2E335B26D70EA21BAE79E936DA29EC35E91685C5ACFC86966E21ACEC4C36E227
                                      SHA-512:5F421A75C381314A0F658F42D88E18A3897B420EDA41F8A2EF167CDB3B5A50C1043FB396573863376D2107B03EDC997E9907CCBE6919379057F78CF26AC68A3B
                                      Malicious:false
                                      Preview:PK..........!(................Data/PK........M..J................Data/Tor/PK..........!(................Tor/PK..........!(..t.......0.....Tor/libeay32.dll.:.t.e....6m.....Me.Vjil....!..E..T..e...*..e....,.c..o=..t.u..,....J..k-.x.V..:1u....v..7.L~..?{..rN23.w......o..N2....WU..G..G.......Ed..7..q.o.5.]w.{...wl\y..m..w...?]......n......Z]UX./h4.....]...71....e.\^1..I..MH5...k.o+..s...c|s....-#d,!..............eW...?a.......R..I..R......w.....m..#od.*q.&..g.;.C(..t.V...j.Jq%...d_.Js...Hk.j#...DH.....,8_.O...]U....t .......ks:..T...18.C.%ASZJ3.U.nl..J.@)...$...N.s.O........m.0..*e..4.....m...lI..Z..7.f-.?....;...?.SO....}..7#.L8...5.z.~.........E.S..1....7.*.0...pf.....jz.)..Y..8..^....B........p.W..r..B.....p..?......../`*Wl..D.xAi..$..d.......&..p. ..bOtE.\.......(..&A...6v..S..Q...L...3 .:.6.m7.'.......)......iH.NZ_t.;./.a..n.g...A`.T.k.........."...<.rt..3....0.{N..yy...p.z.=..#.u.u...d......mQ..*.H..2.N.BRSN...XC....).".@.._.18.&...n
                                      Process:C:\Windows\mssecsvc.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3514368
                                      Entropy (8bit):7.777724762407647
                                      Encrypted:false
                                      SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8s3x:QqPe1Cxcxk3ZAEUadzR8sB
                                      MD5:79409B6F48460807480E4A574312D85F
                                      SHA1:5D9F64CCF13081441F2785A535E02312236445D9
                                      SHA-256:331E14A6594B700B6167690430C9DA72FEE72D408DD1B8C5CB155C0199033D0A
                                      SHA-512:AC004B3248CBC2CE7B6D566E3F5128195669E5C53C24AE13668E37FDADCB5158CC345D7A33CADFED6328A25A640C5FA612D0F0DB86989C3ACC21771B55508916
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                      • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 93%
                                      Joe Sandbox View:
                                      • Filename: 542CxvZnI5.dll, Detection: malicious, Browse
                                      • Filename: UR9TBr66am.dll, Detection: malicious, Browse
                                      • Filename: eAx3JV2z84.dll, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.106029924189513
                                      TrID:
                                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                      • Generic Win/DOS Executable (2004/3) 0.20%
                                      • DOS Executable Generic (2002/1) 0.20%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:txWVWM8Kx4.dll
                                      File size:5'267'459 bytes
                                      MD5:07a5d326b196d166dc0618e7c25ac2b5
                                      SHA1:7a23e2ef0682cfb8813a27dc559da187f9e178f5
                                      SHA256:5d7fa45d2fcb10893ee5bdbfc4b16bdeeffd34aa5791331332a8bbb1015cb63b
                                      SHA512:38088c24dacd01b7ecdef5afdbcbff2ee723bdea65d4e7138c5007b2de823aecd9db2f5e970ea4c132fac2938525b984d94dcc7c8d01af952bd79006b64ddfc2
                                      SSDEEP:98304:d8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8s3:d8qPe1Cxcxk3ZAEUadzR8s
                                      TLSH:9836E052D2850EA4D5E10AF61269DB50A77F2F5582AFB23E2621402F1CB7F1C9DE4F2C
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                      Icon Hash:7ae282899bbab082
                                      Entrypoint:0x100011e9
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x10000000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                      DLL Characteristics:
                                      Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      push ebx
                                      mov ebx, dword ptr [ebp+08h]
                                      push esi
                                      mov esi, dword ptr [ebp+0Ch]
                                      push edi
                                      mov edi, dword ptr [ebp+10h]
                                      test esi, esi
                                      jne 00007F2A9CCB28DBh
                                      cmp dword ptr [10003140h], 00000000h
                                      jmp 00007F2A9CCB28F8h
                                      cmp esi, 01h
                                      je 00007F2A9CCB28D7h
                                      cmp esi, 02h
                                      jne 00007F2A9CCB28F4h
                                      mov eax, dword ptr [10003150h]
                                      test eax, eax
                                      je 00007F2A9CCB28DBh
                                      push edi
                                      push esi
                                      push ebx
                                      call eax
                                      test eax, eax
                                      je 00007F2A9CCB28DEh
                                      push edi
                                      push esi
                                      push ebx
                                      call 00007F2A9CCB27EAh
                                      test eax, eax
                                      jne 00007F2A9CCB28D6h
                                      xor eax, eax
                                      jmp 00007F2A9CCB2920h
                                      push edi
                                      push esi
                                      push ebx
                                      call 00007F2A9CCB269Ch
                                      cmp esi, 01h
                                      mov dword ptr [ebp+0Ch], eax
                                      jne 00007F2A9CCB28DEh
                                      test eax, eax
                                      jne 00007F2A9CCB2909h
                                      push edi
                                      push eax
                                      push ebx
                                      call 00007F2A9CCB27C6h
                                      test esi, esi
                                      je 00007F2A9CCB28D7h
                                      cmp esi, 03h
                                      jne 00007F2A9CCB28F8h
                                      push edi
                                      push esi
                                      push ebx
                                      call 00007F2A9CCB27B5h
                                      test eax, eax
                                      jne 00007F2A9CCB28D5h
                                      and dword ptr [ebp+0Ch], eax
                                      cmp dword ptr [ebp+0Ch], 00000000h
                                      je 00007F2A9CCB28E3h
                                      mov eax, dword ptr [10003150h]
                                      test eax, eax
                                      je 00007F2A9CCB28DAh
                                      push edi
                                      push esi
                                      push ebx
                                      call eax
                                      mov dword ptr [ebp+0Ch], eax
                                      mov eax, dword ptr [ebp+0Ch]
                                      pop edi
                                      pop esi
                                      pop ebx
                                      pop ebp
                                      retn 000Ch
                                      jmp dword ptr [10002028h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      Programming Language:
                                      • [ C ] VS98 (6.0) build 8168
                                      • [C++] VS98 (6.0) build 8168
                                      • [RES] VS98 (6.0) cvtres build 1720
                                      • [LNK] VS98 (6.0) imp/exp build 8168
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x40000x5000600x501000bb90e698cd9907db1ec1973f1c30a5bbunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      W0x40600x500000dataEnglishUnited States0.8770351409912109
                                      DLLImport
                                      KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                      MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                      NameOrdinalAddress
                                      PlayGame10x10001114
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 15, 2025 18:11:57.840711117 CET49674443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:11:58.012501001 CET49675443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:11:58.121884108 CET49673443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:03.066648006 CET49704445192.168.2.552.34.64.23
                                      Jan 15, 2025 18:12:03.071820974 CET4454970452.34.64.23192.168.2.5
                                      Jan 15, 2025 18:12:03.071919918 CET49704445192.168.2.552.34.64.23
                                      Jan 15, 2025 18:12:03.071980953 CET49704445192.168.2.552.34.64.23
                                      Jan 15, 2025 18:12:03.072185993 CET49705445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.077121973 CET4454970552.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:03.077241898 CET49705445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.077243090 CET4454970452.34.64.23192.168.2.5
                                      Jan 15, 2025 18:12:03.077313900 CET49704445192.168.2.552.34.64.23
                                      Jan 15, 2025 18:12:03.077953100 CET49705445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.082885981 CET49706445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.082988024 CET4454970552.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:03.083058119 CET49705445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.087851048 CET4454970652.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:03.087915897 CET49706445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.087970972 CET49706445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:03.092761993 CET4454970652.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:05.060837984 CET49729445192.168.2.559.178.161.129
                                      Jan 15, 2025 18:12:05.065956116 CET4454972959.178.161.129192.168.2.5
                                      Jan 15, 2025 18:12:05.066060066 CET49729445192.168.2.559.178.161.129
                                      Jan 15, 2025 18:12:05.066133022 CET49729445192.168.2.559.178.161.129
                                      Jan 15, 2025 18:12:05.066344976 CET49730445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.071141005 CET4454973059.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:05.071165085 CET4454972959.178.161.129192.168.2.5
                                      Jan 15, 2025 18:12:05.071207047 CET49730445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.071245909 CET49729445192.168.2.559.178.161.129
                                      Jan 15, 2025 18:12:05.071324110 CET49730445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.072818041 CET49731445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.076086998 CET4454973059.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:05.076163054 CET49730445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.077630043 CET4454973159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:05.077764988 CET49731445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.077764988 CET49731445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:05.082555056 CET4454973159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:07.076304913 CET49754445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:07.450073004 CET49674443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:07.621845007 CET49675443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:07.629697084 CET44549754161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:07.629812002 CET49754445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:07.629888058 CET49754445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:07.630218029 CET49761445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.634913921 CET44549754161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:07.634999990 CET44549761161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:07.635051012 CET49754445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:07.635128021 CET49761445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.635282993 CET49761445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.636198044 CET49762445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.640110016 CET44549761161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:07.640228987 CET49761445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.640959024 CET44549762161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:07.641025066 CET49762445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.641091108 CET49762445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:07.645884037 CET44549762161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:07.731211901 CET49673443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:09.092185020 CET49779445192.168.2.5133.14.202.157
                                      Jan 15, 2025 18:12:09.097163916 CET44549779133.14.202.157192.168.2.5
                                      Jan 15, 2025 18:12:09.097294092 CET49779445192.168.2.5133.14.202.157
                                      Jan 15, 2025 18:12:09.097328901 CET49779445192.168.2.5133.14.202.157
                                      Jan 15, 2025 18:12:09.097556114 CET49780445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.102394104 CET44549780133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:09.102422953 CET44549779133.14.202.157192.168.2.5
                                      Jan 15, 2025 18:12:09.102479935 CET49780445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.102519989 CET49780445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.102591038 CET49779445192.168.2.5133.14.202.157
                                      Jan 15, 2025 18:12:09.103708029 CET49781445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.107892990 CET44549780133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:09.107988119 CET49780445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.108562946 CET44549781133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:09.108633995 CET49781445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.108681917 CET49781445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:09.113509893 CET44549781133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:11.002216101 CET4434970323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:11.002325058 CET49703443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:11.107450962 CET49802445192.168.2.5136.243.125.160
                                      Jan 15, 2025 18:12:11.112780094 CET44549802136.243.125.160192.168.2.5
                                      Jan 15, 2025 18:12:11.112947941 CET49802445192.168.2.5136.243.125.160
                                      Jan 15, 2025 18:12:11.113017082 CET49802445192.168.2.5136.243.125.160
                                      Jan 15, 2025 18:12:11.113313913 CET49803445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.118200064 CET44549803136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:11.118352890 CET44549802136.243.125.160192.168.2.5
                                      Jan 15, 2025 18:12:11.118371010 CET49803445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.118422031 CET49802445192.168.2.5136.243.125.160
                                      Jan 15, 2025 18:12:11.118470907 CET49803445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.119596958 CET49804445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.123389006 CET44549803136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:11.123460054 CET49803445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.124440908 CET44549804136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:11.124526024 CET49804445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.124591112 CET49804445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:11.129376888 CET44549804136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:12.798844099 CET44549804136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:12.798985004 CET49804445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:12.799031973 CET49804445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:12.799129963 CET49804445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:12.804034948 CET44549804136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:12.804069996 CET44549804136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:13.143161058 CET49827445192.168.2.574.80.92.140
                                      Jan 15, 2025 18:12:13.148497105 CET4454982774.80.92.140192.168.2.5
                                      Jan 15, 2025 18:12:13.148652077 CET49827445192.168.2.574.80.92.140
                                      Jan 15, 2025 18:12:13.156893015 CET49827445192.168.2.574.80.92.140
                                      Jan 15, 2025 18:12:13.157187939 CET49828445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.161963940 CET4454982774.80.92.140192.168.2.5
                                      Jan 15, 2025 18:12:13.162060022 CET49827445192.168.2.574.80.92.140
                                      Jan 15, 2025 18:12:13.162067890 CET4454982874.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:13.162148952 CET49828445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.179750919 CET49828445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.184722900 CET4454982874.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:13.184880972 CET49828445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.189855099 CET49829445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.194911003 CET4454982974.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:13.194993019 CET49829445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.198200941 CET49829445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:13.203072071 CET4454982974.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:15.138309002 CET49850445192.168.2.5104.93.180.79
                                      Jan 15, 2025 18:12:15.143338919 CET44549850104.93.180.79192.168.2.5
                                      Jan 15, 2025 18:12:15.143435001 CET49850445192.168.2.5104.93.180.79
                                      Jan 15, 2025 18:12:15.143481970 CET49850445192.168.2.5104.93.180.79
                                      Jan 15, 2025 18:12:15.143582106 CET49851445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.148355961 CET44549851104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:15.148502111 CET44549850104.93.180.79192.168.2.5
                                      Jan 15, 2025 18:12:15.148572922 CET49851445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.148726940 CET49850445192.168.2.5104.93.180.79
                                      Jan 15, 2025 18:12:15.148726940 CET49851445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.148937941 CET49852445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.153543949 CET44549851104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:15.153603077 CET49851445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.153794050 CET44549852104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:15.153950930 CET49852445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.153950930 CET49852445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:15.158763885 CET44549852104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:15.269102097 CET4454982974.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:15.269187927 CET49829445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:15.269231081 CET49829445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:15.269304991 CET49829445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:15.274099112 CET4454982974.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:15.274115086 CET4454982974.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:15.817893982 CET49860445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:15.822957039 CET44549860136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:15.823086977 CET49860445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:15.841398954 CET49860445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:15.846282005 CET44549860136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:17.156418085 CET49874445192.168.2.560.213.189.205
                                      Jan 15, 2025 18:12:17.161564112 CET4454987460.213.189.205192.168.2.5
                                      Jan 15, 2025 18:12:17.162924051 CET49874445192.168.2.560.213.189.205
                                      Jan 15, 2025 18:12:17.163012981 CET49874445192.168.2.560.213.189.205
                                      Jan 15, 2025 18:12:17.163173914 CET49875445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:17.168028116 CET4454987560.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:17.168462992 CET4454987460.213.189.205192.168.2.5
                                      Jan 15, 2025 18:12:17.168602943 CET49874445192.168.2.560.213.189.205
                                      Jan 15, 2025 18:12:17.168628931 CET49875445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:17.169198990 CET49876445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:17.173800945 CET4454987560.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:17.174061060 CET4454987560.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:17.174120903 CET49875445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:17.174300909 CET4454987660.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:17.174361944 CET49876445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:17.174393892 CET49876445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:17.179399967 CET4454987660.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:17.522665977 CET44549860136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:17.522958994 CET49860445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:17.523181915 CET49860445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:17.523181915 CET49860445192.168.2.5136.243.125.1
                                      Jan 15, 2025 18:12:17.528049946 CET44549860136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:17.528069019 CET44549860136.243.125.1192.168.2.5
                                      Jan 15, 2025 18:12:17.575548887 CET49884445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.580643892 CET44549884136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:17.581000090 CET49884445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.581110001 CET49884445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.581509113 CET49885445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.586106062 CET44549884136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:17.586388111 CET44549885136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:17.586458921 CET49884445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.586533070 CET49885445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.586615086 CET49885445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:17.591428041 CET44549885136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:18.278522015 CET49893445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:18.283493996 CET4454989374.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:18.283657074 CET49893445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:18.283793926 CET49893445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:18.288656950 CET4454989374.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:19.009828091 CET49703443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:19.010127068 CET49703443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:19.014692068 CET4434970323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:19.014955997 CET4434970323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:19.017595053 CET49903443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:19.017649889 CET4434990323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:19.017720938 CET49903443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:19.018434048 CET49903443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:19.018467903 CET4434990323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:19.169719934 CET49906445192.168.2.560.171.191.45
                                      Jan 15, 2025 18:12:19.174710035 CET4454990660.171.191.45192.168.2.5
                                      Jan 15, 2025 18:12:19.174777985 CET49906445192.168.2.560.171.191.45
                                      Jan 15, 2025 18:12:19.174880028 CET49906445192.168.2.560.171.191.45
                                      Jan 15, 2025 18:12:19.175086975 CET49907445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.181413889 CET4454990660.171.191.45192.168.2.5
                                      Jan 15, 2025 18:12:19.181426048 CET4454990760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:19.181474924 CET49906445192.168.2.560.171.191.45
                                      Jan 15, 2025 18:12:19.181503057 CET49907445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.181600094 CET49907445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.182049990 CET49908445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.186847925 CET4454990760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:19.186860085 CET4454990860.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:19.186903954 CET49907445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.186929941 CET49908445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.187046051 CET49908445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:19.191859007 CET4454990860.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:19.609874964 CET4434990323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:19.609947920 CET49903443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:20.328916073 CET4454989374.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:20.328999043 CET49893445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:20.329145908 CET49893445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:20.329145908 CET49893445192.168.2.574.80.92.1
                                      Jan 15, 2025 18:12:20.333964109 CET4454989374.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:20.333980083 CET4454989374.80.92.1192.168.2.5
                                      Jan 15, 2025 18:12:20.387691021 CET49928445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.392760038 CET4454992874.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:20.392936945 CET49928445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.393277884 CET49928445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.393512011 CET49929445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.398361921 CET4454992974.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:20.398485899 CET49929445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.398485899 CET49929445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.398578882 CET4454992874.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:20.398778915 CET49928445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:20.403414011 CET4454992974.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:21.186943054 CET49944445192.168.2.575.48.114.78
                                      Jan 15, 2025 18:12:21.191998005 CET4454994475.48.114.78192.168.2.5
                                      Jan 15, 2025 18:12:21.192095995 CET49944445192.168.2.575.48.114.78
                                      Jan 15, 2025 18:12:21.192157030 CET49944445192.168.2.575.48.114.78
                                      Jan 15, 2025 18:12:21.192380905 CET49945445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.197098017 CET4454994475.48.114.78192.168.2.5
                                      Jan 15, 2025 18:12:21.197150946 CET4454994575.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:21.197165966 CET49944445192.168.2.575.48.114.78
                                      Jan 15, 2025 18:12:21.197222948 CET49945445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.197276115 CET49945445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.197762966 CET49946445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.202219963 CET4454994575.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:21.202285051 CET49945445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.202519894 CET4454994675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:21.202590942 CET49946445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.202622890 CET49946445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:21.207386971 CET4454994675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:22.456170082 CET4454992974.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:22.456464052 CET49929445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:22.456464052 CET49929445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:22.456516027 CET49929445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:22.461328983 CET4454992974.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:22.461340904 CET4454992974.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:23.200305939 CET49983445192.168.2.5198.243.245.217
                                      Jan 15, 2025 18:12:23.205177069 CET44549983198.243.245.217192.168.2.5
                                      Jan 15, 2025 18:12:23.210922003 CET49983445192.168.2.5198.243.245.217
                                      Jan 15, 2025 18:12:23.210937023 CET49983445192.168.2.5198.243.245.217
                                      Jan 15, 2025 18:12:23.211086035 CET49984445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:23.215928078 CET44549984198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:23.216031075 CET44549983198.243.245.217192.168.2.5
                                      Jan 15, 2025 18:12:23.216114998 CET49984445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:23.216115952 CET49983445192.168.2.5198.243.245.217
                                      Jan 15, 2025 18:12:23.216439009 CET49985445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:23.221136093 CET44549984198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:23.221189976 CET44549985198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:23.221287966 CET49984445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:23.221327066 CET49985445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:23.221355915 CET49985445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:23.226098061 CET44549985198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:24.447343111 CET4454970652.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:24.447567940 CET49706445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:24.447567940 CET49706445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:24.447640896 CET49706445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:24.452606916 CET4454970652.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:24.452624083 CET4454970652.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:25.215943098 CET50017445192.168.2.5188.228.236.160
                                      Jan 15, 2025 18:12:25.220880985 CET44550017188.228.236.160192.168.2.5
                                      Jan 15, 2025 18:12:25.220961094 CET50017445192.168.2.5188.228.236.160
                                      Jan 15, 2025 18:12:25.221007109 CET50017445192.168.2.5188.228.236.160
                                      Jan 15, 2025 18:12:25.221159935 CET50018445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.225965977 CET44550017188.228.236.160192.168.2.5
                                      Jan 15, 2025 18:12:25.225981951 CET44550018188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:25.226075888 CET50017445192.168.2.5188.228.236.160
                                      Jan 15, 2025 18:12:25.226111889 CET50018445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.226185083 CET50018445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.226500988 CET50019445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.231300116 CET44550019188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:25.231375933 CET50019445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.231412888 CET50019445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.232024908 CET44550018188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:25.232075930 CET50018445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:25.236382961 CET44550019188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:25.465922117 CET50024445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:25.472371101 CET4455002474.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:25.472476959 CET50024445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:25.472517967 CET50024445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:25.479099989 CET4455002474.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:26.447333097 CET4454973159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:26.447453976 CET49731445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:26.447453976 CET49731445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:26.447526932 CET49731445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:26.452423096 CET4454973159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:26.452440977 CET4454973159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:27.233848095 CET50057445192.168.2.541.167.36.161
                                      Jan 15, 2025 18:12:27.238719940 CET4455005741.167.36.161192.168.2.5
                                      Jan 15, 2025 18:12:27.238801956 CET50057445192.168.2.541.167.36.161
                                      Jan 15, 2025 18:12:27.238888025 CET50057445192.168.2.541.167.36.161
                                      Jan 15, 2025 18:12:27.239027023 CET50058445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.243916035 CET4455005841.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:27.243982077 CET50058445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.243994951 CET4455005741.167.36.161192.168.2.5
                                      Jan 15, 2025 18:12:27.244045019 CET50057445192.168.2.541.167.36.161
                                      Jan 15, 2025 18:12:27.244153976 CET50058445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.244468927 CET50060445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.248914003 CET4455005841.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:27.248997927 CET50058445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.249217033 CET4455006041.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:27.249496937 CET50060445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.249497890 CET50060445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:27.254317999 CET4455006041.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:27.456679106 CET50061445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:27.461776018 CET4455006152.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:27.461880922 CET50061445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:27.464605093 CET50061445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:27.469441891 CET4455006152.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:27.549438000 CET4455002474.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:27.549612045 CET50024445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:27.584677935 CET50024445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:27.584777117 CET50024445192.168.2.574.80.92.2
                                      Jan 15, 2025 18:12:27.589766026 CET4455002474.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:27.589786053 CET4455002474.80.92.2192.168.2.5
                                      Jan 15, 2025 18:12:27.640364885 CET50063445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.645212889 CET4455006374.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:27.645523071 CET50063445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.648679972 CET50063445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.653537035 CET4455006374.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:27.653621912 CET50063445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.662833929 CET50064445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.667687893 CET4455006474.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:27.667772055 CET50064445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.667798042 CET50064445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:27.672540903 CET4455006474.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:29.026011944 CET44549762161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:29.026195049 CET49762445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:29.026276112 CET49762445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:29.026357889 CET49762445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:29.031106949 CET44549762161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:29.031131029 CET44549762161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:29.248267889 CET50076445192.168.2.5147.208.214.20
                                      Jan 15, 2025 18:12:29.253192902 CET44550076147.208.214.20192.168.2.5
                                      Jan 15, 2025 18:12:29.258990049 CET50076445192.168.2.5147.208.214.20
                                      Jan 15, 2025 18:12:29.259119987 CET50076445192.168.2.5147.208.214.20
                                      Jan 15, 2025 18:12:29.259387016 CET50077445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.264180899 CET44550076147.208.214.20192.168.2.5
                                      Jan 15, 2025 18:12:29.264210939 CET44550077147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:29.264317036 CET50076445192.168.2.5147.208.214.20
                                      Jan 15, 2025 18:12:29.264369011 CET50077445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.264456034 CET50077445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.264796019 CET50078445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.269354105 CET44550077147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:29.269668102 CET44550078147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:29.269737005 CET50077445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.269752979 CET50078445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.269839048 CET50078445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:29.274593115 CET44550078147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:29.450216055 CET50081445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:29.455116034 CET4455008159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:29.455204964 CET50081445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:29.455445051 CET50081445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:29.460163116 CET4455008159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:30.511759043 CET44549781133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:30.511974096 CET49781445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:30.512054920 CET49781445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:30.512135983 CET49781445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:30.516839981 CET44549781133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:30.516935110 CET44549781133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:31.263140917 CET50094445192.168.2.582.127.77.223
                                      Jan 15, 2025 18:12:31.268064976 CET4455009482.127.77.223192.168.2.5
                                      Jan 15, 2025 18:12:31.268153906 CET50094445192.168.2.582.127.77.223
                                      Jan 15, 2025 18:12:31.268234968 CET50094445192.168.2.582.127.77.223
                                      Jan 15, 2025 18:12:31.268445969 CET50095445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.273271084 CET4455009582.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:31.273309946 CET4455009482.127.77.223192.168.2.5
                                      Jan 15, 2025 18:12:31.273340940 CET50095445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.273375034 CET50095445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.273379087 CET50094445192.168.2.582.127.77.223
                                      Jan 15, 2025 18:12:31.273775101 CET50096445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.278400898 CET4455009582.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:31.278459072 CET50095445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.278554916 CET4455009682.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:31.278614998 CET50096445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.279009104 CET50096445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:31.283788919 CET4455009682.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:32.028601885 CET50102445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:32.033638000 CET44550102161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:32.034929037 CET50102445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:32.039088964 CET50102445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:32.043900967 CET44550102161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:33.278779030 CET50109445192.168.2.5193.209.214.28
                                      Jan 15, 2025 18:12:33.283608913 CET44550109193.209.214.28192.168.2.5
                                      Jan 15, 2025 18:12:33.283677101 CET50109445192.168.2.5193.209.214.28
                                      Jan 15, 2025 18:12:33.283751011 CET50109445192.168.2.5193.209.214.28
                                      Jan 15, 2025 18:12:33.283904076 CET50110445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.288687944 CET44550109193.209.214.28192.168.2.5
                                      Jan 15, 2025 18:12:33.288700104 CET44550110193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:33.288734913 CET50109445192.168.2.5193.209.214.28
                                      Jan 15, 2025 18:12:33.288781881 CET50110445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.288850069 CET50110445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.289316893 CET50111445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.293740988 CET44550110193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:33.293796062 CET50110445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.294100046 CET44550111193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:33.294156075 CET50111445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.294181108 CET50111445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:33.298930883 CET44550111193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:33.513092041 CET50115445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:33.518353939 CET44550115133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:33.518481016 CET50115445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:33.518521070 CET50115445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:33.523933887 CET44550115133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:35.294049025 CET50128445192.168.2.5161.4.168.214
                                      Jan 15, 2025 18:12:35.298926115 CET44550128161.4.168.214192.168.2.5
                                      Jan 15, 2025 18:12:35.299022913 CET50128445192.168.2.5161.4.168.214
                                      Jan 15, 2025 18:12:35.299066067 CET50128445192.168.2.5161.4.168.214
                                      Jan 15, 2025 18:12:35.299166918 CET50129445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.303992987 CET44550129161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:35.304080963 CET50129445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.304115057 CET50129445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.304383993 CET44550128161.4.168.214192.168.2.5
                                      Jan 15, 2025 18:12:35.304440975 CET50128445192.168.2.5161.4.168.214
                                      Jan 15, 2025 18:12:35.304562092 CET50130445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.309022903 CET44550129161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:35.309106112 CET50129445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.309344053 CET44550130161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:35.309406042 CET50130445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.309443951 CET50130445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:35.314261913 CET44550130161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:36.510061979 CET44549852104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:36.511327028 CET49852445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:36.526226044 CET49852445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:36.526226044 CET49852445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:36.531239986 CET44549852104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:36.531255960 CET44549852104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:37.309756041 CET50143445192.168.2.595.129.132.70
                                      Jan 15, 2025 18:12:37.314738035 CET4455014395.129.132.70192.168.2.5
                                      Jan 15, 2025 18:12:37.314826012 CET50143445192.168.2.595.129.132.70
                                      Jan 15, 2025 18:12:37.314915895 CET50143445192.168.2.595.129.132.70
                                      Jan 15, 2025 18:12:37.315130949 CET50144445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.319811106 CET4455014395.129.132.70192.168.2.5
                                      Jan 15, 2025 18:12:37.319889069 CET50143445192.168.2.595.129.132.70
                                      Jan 15, 2025 18:12:37.320005894 CET4455014495.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:37.320076942 CET50144445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.320131063 CET50144445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.320378065 CET50145445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.324985981 CET4455014495.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:37.325048923 CET50144445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.325297117 CET4455014595.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:37.325352907 CET50145445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.325376987 CET50145445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:37.330158949 CET4455014595.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:38.592168093 CET4454987660.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:38.592343092 CET49876445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:38.598349094 CET49876445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:38.598349094 CET49876445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:38.603244066 CET4454987660.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:38.603257895 CET4454987660.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:38.775377989 CET4434990323.1.237.91192.168.2.5
                                      Jan 15, 2025 18:12:38.775469065 CET49903443192.168.2.523.1.237.91
                                      Jan 15, 2025 18:12:38.994700909 CET44549885136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:38.994796991 CET49885445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:38.994836092 CET49885445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:38.994867086 CET49885445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:38.999767065 CET44549885136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:38.999797106 CET44549885136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:39.185041904 CET50157445192.168.2.5113.103.233.249
                                      Jan 15, 2025 18:12:39.189954996 CET44550157113.103.233.249192.168.2.5
                                      Jan 15, 2025 18:12:39.192955971 CET50157445192.168.2.5113.103.233.249
                                      Jan 15, 2025 18:12:39.192986012 CET50157445192.168.2.5113.103.233.249
                                      Jan 15, 2025 18:12:39.193144083 CET50159445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.198035955 CET44550159113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:12:39.198138952 CET44550157113.103.233.249192.168.2.5
                                      Jan 15, 2025 18:12:39.198159933 CET50159445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.198187113 CET50157445192.168.2.5113.103.233.249
                                      Jan 15, 2025 18:12:39.198348045 CET50159445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.198755026 CET50160445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.203416109 CET44550159113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:12:39.203586102 CET44550160113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:12:39.203671932 CET50159445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.203704119 CET50160445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.203744888 CET50160445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:12:39.208508968 CET44550160113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:12:39.530397892 CET50163445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:39.535274029 CET44550163104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:39.537921906 CET50163445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:39.537970066 CET50163445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:12:39.542774916 CET44550163104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:12:40.541060925 CET4454990860.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:40.541344881 CET49908445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:40.541400909 CET49908445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:40.541475058 CET49908445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:40.546195984 CET4454990860.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:40.546257019 CET4454990860.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:40.934732914 CET50173445192.168.2.5126.96.38.227
                                      Jan 15, 2025 18:12:40.939538002 CET44550173126.96.38.227192.168.2.5
                                      Jan 15, 2025 18:12:40.939610958 CET50173445192.168.2.5126.96.38.227
                                      Jan 15, 2025 18:12:40.939634085 CET50173445192.168.2.5126.96.38.227
                                      Jan 15, 2025 18:12:40.939889908 CET50174445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:12:40.944664955 CET44550174126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:12:40.944677114 CET44550173126.96.38.227192.168.2.5
                                      Jan 15, 2025 18:12:40.944739103 CET50173445192.168.2.5126.96.38.227
                                      Jan 15, 2025 18:12:40.944751978 CET50174445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:12:40.945091963 CET50175445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:12:40.949759960 CET44550174126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:12:40.949824095 CET44550175126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:12:40.949877977 CET50175445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:12:40.949980021 CET50175445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:12:40.950783014 CET44550174126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:12:40.950822115 CET50174445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:12:40.954668045 CET44550175126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:12:41.606400967 CET50180445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:41.611212969 CET4455018060.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:41.611268997 CET50180445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:41.611306906 CET50180445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:12:41.616147041 CET4455018060.213.189.1192.168.2.5
                                      Jan 15, 2025 18:12:41.997009039 CET50183445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:42.001852989 CET44550183136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:42.002096891 CET50183445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:42.002096891 CET50183445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:12:42.006886005 CET44550183136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:12:42.575486898 CET50189445192.168.2.529.147.136.127
                                      Jan 15, 2025 18:12:42.580518007 CET4455018929.147.136.127192.168.2.5
                                      Jan 15, 2025 18:12:42.583035946 CET50189445192.168.2.529.147.136.127
                                      Jan 15, 2025 18:12:42.583158016 CET50190445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.583163023 CET50189445192.168.2.529.147.136.127
                                      Jan 15, 2025 18:12:42.588184118 CET4455019029.147.136.1192.168.2.5
                                      Jan 15, 2025 18:12:42.588345051 CET4455018929.147.136.127192.168.2.5
                                      Jan 15, 2025 18:12:42.588459015 CET50189445192.168.2.529.147.136.127
                                      Jan 15, 2025 18:12:42.588547945 CET50190445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.588547945 CET50190445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.588778973 CET50191445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.593699932 CET4455019129.147.136.1192.168.2.5
                                      Jan 15, 2025 18:12:42.593732119 CET4455019029.147.136.1192.168.2.5
                                      Jan 15, 2025 18:12:42.593801975 CET50190445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.593817949 CET50191445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.593863964 CET50191445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:12:42.598669052 CET4455019129.147.136.1192.168.2.5
                                      Jan 15, 2025 18:12:42.619066000 CET4454994675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:42.622919083 CET49946445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:42.622958899 CET49946445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:42.622991085 CET49946445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:42.627938986 CET4454994675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:42.627968073 CET4454994675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:43.544794083 CET50197445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:43.550209045 CET4455019760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:43.550313950 CET50197445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:43.550359964 CET50197445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:12:43.557265997 CET4455019760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:12:44.106734991 CET50202445192.168.2.5152.117.243.51
                                      Jan 15, 2025 18:12:44.111507893 CET44550202152.117.243.51192.168.2.5
                                      Jan 15, 2025 18:12:44.111630917 CET50202445192.168.2.5152.117.243.51
                                      Jan 15, 2025 18:12:44.111648083 CET50202445192.168.2.5152.117.243.51
                                      Jan 15, 2025 18:12:44.111880064 CET50203445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.116574049 CET44550202152.117.243.51192.168.2.5
                                      Jan 15, 2025 18:12:44.116633892 CET50202445192.168.2.5152.117.243.51
                                      Jan 15, 2025 18:12:44.116727114 CET44550203152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:44.116781950 CET50203445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.116796017 CET50203445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.117197990 CET50204445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.121817112 CET44550203152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:44.121865034 CET50203445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.122035980 CET44550204152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:44.122090101 CET50204445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.123354912 CET50204445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:44.128153086 CET44550204152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:44.592247009 CET44549985198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:44.594963074 CET49985445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:44.595038891 CET49985445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:44.595040083 CET49985445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:44.599870920 CET44549985198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:44.599884033 CET44549985198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:45.589202881 CET50214445192.168.2.599.19.50.104
                                      Jan 15, 2025 18:12:45.594095945 CET4455021499.19.50.104192.168.2.5
                                      Jan 15, 2025 18:12:45.594244957 CET50214445192.168.2.599.19.50.104
                                      Jan 15, 2025 18:12:45.595402002 CET50214445192.168.2.599.19.50.104
                                      Jan 15, 2025 18:12:45.595551014 CET50215445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.600244045 CET4455021499.19.50.104192.168.2.5
                                      Jan 15, 2025 18:12:45.600327969 CET50214445192.168.2.599.19.50.104
                                      Jan 15, 2025 18:12:45.600361109 CET4455021599.19.50.1192.168.2.5
                                      Jan 15, 2025 18:12:45.600418091 CET50215445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.602536917 CET50215445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.607383966 CET4455021599.19.50.1192.168.2.5
                                      Jan 15, 2025 18:12:45.607497931 CET50215445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.637880087 CET50216445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:45.641254902 CET50217445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.642786026 CET4455021675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:45.642860889 CET50216445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:45.642898083 CET50216445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:12:45.646182060 CET4455021799.19.50.1192.168.2.5
                                      Jan 15, 2025 18:12:45.646250963 CET50217445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.646295071 CET50217445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:12:45.647665024 CET4455021675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:12:45.651103020 CET4455021799.19.50.1192.168.2.5
                                      Jan 15, 2025 18:12:46.623718977 CET44550019188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:46.626966953 CET50019445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:46.627047062 CET50019445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:46.627047062 CET50019445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:46.631906986 CET44550019188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:46.631917000 CET44550019188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:46.887892008 CET50225445192.168.2.543.89.144.111
                                      Jan 15, 2025 18:12:46.892750025 CET4455022543.89.144.111192.168.2.5
                                      Jan 15, 2025 18:12:46.892841101 CET50225445192.168.2.543.89.144.111
                                      Jan 15, 2025 18:12:46.892883062 CET50225445192.168.2.543.89.144.111
                                      Jan 15, 2025 18:12:46.893028975 CET50226445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.897805929 CET4455022543.89.144.111192.168.2.5
                                      Jan 15, 2025 18:12:46.897869110 CET4455022643.89.144.1192.168.2.5
                                      Jan 15, 2025 18:12:46.897892952 CET4455022543.89.144.111192.168.2.5
                                      Jan 15, 2025 18:12:46.897959948 CET50226445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.897974968 CET50225445192.168.2.543.89.144.111
                                      Jan 15, 2025 18:12:46.898163080 CET50226445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.898370981 CET50227445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.903047085 CET4455022643.89.144.1192.168.2.5
                                      Jan 15, 2025 18:12:46.903187990 CET50226445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.903256893 CET4455022743.89.144.1192.168.2.5
                                      Jan 15, 2025 18:12:46.903362989 CET50227445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.903363943 CET50227445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:12:46.908252954 CET4455022743.89.144.1192.168.2.5
                                      Jan 15, 2025 18:12:47.606280088 CET50233445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:47.611110926 CET44550233198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:47.611644983 CET50233445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:47.611665964 CET50233445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:12:47.616421938 CET44550233198.243.245.1192.168.2.5
                                      Jan 15, 2025 18:12:48.122286081 CET50239445192.168.2.5194.81.103.25
                                      Jan 15, 2025 18:12:48.127119064 CET44550239194.81.103.25192.168.2.5
                                      Jan 15, 2025 18:12:48.127239943 CET50239445192.168.2.5194.81.103.25
                                      Jan 15, 2025 18:12:48.127257109 CET50239445192.168.2.5194.81.103.25
                                      Jan 15, 2025 18:12:48.127372980 CET50240445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.132112026 CET44550240194.81.103.1192.168.2.5
                                      Jan 15, 2025 18:12:48.132169962 CET50240445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.132188082 CET50240445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.132555962 CET50241445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.133295059 CET44550239194.81.103.25192.168.2.5
                                      Jan 15, 2025 18:12:48.133344889 CET50239445192.168.2.5194.81.103.25
                                      Jan 15, 2025 18:12:48.137077093 CET44550240194.81.103.1192.168.2.5
                                      Jan 15, 2025 18:12:48.137121916 CET50240445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.137301922 CET44550241194.81.103.1192.168.2.5
                                      Jan 15, 2025 18:12:48.137439013 CET50241445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.137475014 CET50241445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:12:48.142189026 CET44550241194.81.103.1192.168.2.5
                                      Jan 15, 2025 18:12:48.604151011 CET4455006041.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:48.604346991 CET50060445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:48.604415894 CET50060445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:48.604415894 CET50060445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:48.609170914 CET4455006041.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:48.609183073 CET4455006041.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:48.873579979 CET4455006152.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:48.873672009 CET50061445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:48.873730898 CET50061445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:48.873779058 CET50061445192.168.2.552.34.64.1
                                      Jan 15, 2025 18:12:48.878746986 CET4455006152.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:48.878781080 CET4455006152.34.64.1192.168.2.5
                                      Jan 15, 2025 18:12:48.934505939 CET50246445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.939479113 CET4455024652.34.64.2192.168.2.5
                                      Jan 15, 2025 18:12:48.939558983 CET50246445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.939590931 CET50246445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.940079927 CET50247445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.944664955 CET4455024652.34.64.2192.168.2.5
                                      Jan 15, 2025 18:12:48.944720030 CET50246445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.944974899 CET4455024752.34.64.2192.168.2.5
                                      Jan 15, 2025 18:12:48.945043087 CET50247445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.945082903 CET50247445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:12:48.949836016 CET4455024752.34.64.2192.168.2.5
                                      Jan 15, 2025 18:12:49.057089090 CET4455006474.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:49.057290077 CET50064445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:49.057385921 CET50064445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:49.057387114 CET50064445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:49.063488007 CET4455006474.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:49.063505888 CET4455006474.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:49.278614998 CET50248445192.168.2.5180.35.1.114
                                      Jan 15, 2025 18:12:49.285106897 CET44550248180.35.1.114192.168.2.5
                                      Jan 15, 2025 18:12:49.285324097 CET50248445192.168.2.5180.35.1.114
                                      Jan 15, 2025 18:12:49.285460949 CET50248445192.168.2.5180.35.1.114
                                      Jan 15, 2025 18:12:49.285676956 CET50249445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.291958094 CET44550249180.35.1.1192.168.2.5
                                      Jan 15, 2025 18:12:49.292048931 CET50249445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.292059898 CET44550248180.35.1.114192.168.2.5
                                      Jan 15, 2025 18:12:49.292109013 CET50249445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.292136908 CET50248445192.168.2.5180.35.1.114
                                      Jan 15, 2025 18:12:49.292573929 CET50250445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.298701048 CET44550249180.35.1.1192.168.2.5
                                      Jan 15, 2025 18:12:49.298800945 CET50249445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.299119949 CET44550250180.35.1.1192.168.2.5
                                      Jan 15, 2025 18:12:49.299213886 CET50250445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.299256086 CET50250445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:12:49.304620028 CET44550250180.35.1.1192.168.2.5
                                      Jan 15, 2025 18:12:49.637614965 CET50255445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:49.642528057 CET44550255188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:49.642663956 CET50255445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:49.642663956 CET50255445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:12:49.647543907 CET44550255188.228.236.1192.168.2.5
                                      Jan 15, 2025 18:12:50.356519938 CET50260445192.168.2.5107.54.42.129
                                      Jan 15, 2025 18:12:50.361402035 CET44550260107.54.42.129192.168.2.5
                                      Jan 15, 2025 18:12:50.361504078 CET50260445192.168.2.5107.54.42.129
                                      Jan 15, 2025 18:12:50.361552000 CET50260445192.168.2.5107.54.42.129
                                      Jan 15, 2025 18:12:50.361850023 CET50261445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.366584063 CET44550260107.54.42.129192.168.2.5
                                      Jan 15, 2025 18:12:50.366662979 CET50260445192.168.2.5107.54.42.129
                                      Jan 15, 2025 18:12:50.366703033 CET44550261107.54.42.1192.168.2.5
                                      Jan 15, 2025 18:12:50.366754055 CET50261445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.366785049 CET50261445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.367005110 CET50262445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.371669054 CET44550261107.54.42.1192.168.2.5
                                      Jan 15, 2025 18:12:50.371782064 CET50261445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.371810913 CET44550262107.54.42.1192.168.2.5
                                      Jan 15, 2025 18:12:50.371937990 CET50262445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.371937990 CET50262445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:12:50.376713037 CET44550262107.54.42.1192.168.2.5
                                      Jan 15, 2025 18:12:50.666568995 CET44550078147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:50.666637897 CET50078445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:50.666690111 CET50078445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:50.666753054 CET50078445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:50.671488047 CET44550078147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:50.671556950 CET44550078147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:50.824708939 CET4455008159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:50.824809074 CET50081445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:50.824938059 CET50081445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:50.825005054 CET50081445192.168.2.559.178.161.1
                                      Jan 15, 2025 18:12:50.829808950 CET4455008159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:50.829819918 CET4455008159.178.161.1192.168.2.5
                                      Jan 15, 2025 18:12:50.887754917 CET50264445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.892837048 CET4455026459.178.161.2192.168.2.5
                                      Jan 15, 2025 18:12:50.892954111 CET50264445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.893004894 CET50264445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.893270016 CET50265445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.898144960 CET4455026559.178.161.2192.168.2.5
                                      Jan 15, 2025 18:12:50.898178101 CET4455026459.178.161.2192.168.2.5
                                      Jan 15, 2025 18:12:50.898225069 CET50265445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.898257017 CET50264445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.898266077 CET50265445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:12:50.903141975 CET4455026559.178.161.2192.168.2.5
                                      Jan 15, 2025 18:12:51.346963882 CET44550204152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:51.347070932 CET50204445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:51.347140074 CET50204445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:51.347141027 CET50204445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:51.352015972 CET44550204152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:51.352050066 CET44550204152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:51.373874903 CET50271445192.168.2.5136.227.119.21
                                      Jan 15, 2025 18:12:51.378941059 CET44550271136.227.119.21192.168.2.5
                                      Jan 15, 2025 18:12:51.379034042 CET50271445192.168.2.5136.227.119.21
                                      Jan 15, 2025 18:12:51.379164934 CET50271445192.168.2.5136.227.119.21
                                      Jan 15, 2025 18:12:51.379340887 CET50272445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.384228945 CET44550272136.227.119.1192.168.2.5
                                      Jan 15, 2025 18:12:51.384316921 CET44550271136.227.119.21192.168.2.5
                                      Jan 15, 2025 18:12:51.384320021 CET50272445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.384381056 CET50271445192.168.2.5136.227.119.21
                                      Jan 15, 2025 18:12:51.384433985 CET50272445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.384747982 CET50273445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.389543056 CET44550272136.227.119.1192.168.2.5
                                      Jan 15, 2025 18:12:51.389616966 CET44550273136.227.119.1192.168.2.5
                                      Jan 15, 2025 18:12:51.389621973 CET50272445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.389708042 CET50273445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.389731884 CET50273445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:12:51.394536018 CET44550273136.227.119.1192.168.2.5
                                      Jan 15, 2025 18:12:51.606416941 CET50274445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:51.611429930 CET4455027441.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:51.611566067 CET50274445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:51.611644983 CET50274445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:12:51.616437912 CET4455027441.167.36.1192.168.2.5
                                      Jan 15, 2025 18:12:52.059554100 CET50279445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:52.064495087 CET4455027974.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:52.064738035 CET50279445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:52.064779043 CET50279445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:12:52.069593906 CET4455027974.80.92.3192.168.2.5
                                      Jan 15, 2025 18:12:52.309919119 CET50281445192.168.2.57.191.5.66
                                      Jan 15, 2025 18:12:52.314840078 CET445502817.191.5.66192.168.2.5
                                      Jan 15, 2025 18:12:52.315092087 CET50281445192.168.2.57.191.5.66
                                      Jan 15, 2025 18:12:52.315109015 CET50281445192.168.2.57.191.5.66
                                      Jan 15, 2025 18:12:52.315265894 CET50282445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.320112944 CET445502827.191.5.1192.168.2.5
                                      Jan 15, 2025 18:12:52.320171118 CET445502817.191.5.66192.168.2.5
                                      Jan 15, 2025 18:12:52.320205927 CET50282445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.320245028 CET50281445192.168.2.57.191.5.66
                                      Jan 15, 2025 18:12:52.320245028 CET50282445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.320453882 CET50283445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.325196981 CET445502827.191.5.1192.168.2.5
                                      Jan 15, 2025 18:12:52.325329065 CET445502837.191.5.1192.168.2.5
                                      Jan 15, 2025 18:12:52.325329065 CET50282445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.325422049 CET50283445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.325422049 CET50283445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:12:52.330228090 CET445502837.191.5.1192.168.2.5
                                      Jan 15, 2025 18:12:52.619677067 CET4455009682.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:52.619755030 CET50096445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:52.619961977 CET50096445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:52.619961977 CET50096445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:52.624751091 CET4455009682.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:52.624772072 CET4455009682.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:53.186453104 CET50289445192.168.2.5108.182.16.49
                                      Jan 15, 2025 18:12:53.191390991 CET44550289108.182.16.49192.168.2.5
                                      Jan 15, 2025 18:12:53.191500902 CET50289445192.168.2.5108.182.16.49
                                      Jan 15, 2025 18:12:53.192085028 CET50289445192.168.2.5108.182.16.49
                                      Jan 15, 2025 18:12:53.192306042 CET50290445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.196981907 CET44550289108.182.16.49192.168.2.5
                                      Jan 15, 2025 18:12:53.197082996 CET50289445192.168.2.5108.182.16.49
                                      Jan 15, 2025 18:12:53.197298050 CET44550290108.182.16.1192.168.2.5
                                      Jan 15, 2025 18:12:53.197381020 CET50290445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.200304985 CET50290445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.200892925 CET50291445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.205821037 CET44550290108.182.16.1192.168.2.5
                                      Jan 15, 2025 18:12:53.205852032 CET44550291108.182.16.1192.168.2.5
                                      Jan 15, 2025 18:12:53.205915928 CET50291445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.205950022 CET50291445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.206995964 CET44550290108.182.16.1192.168.2.5
                                      Jan 15, 2025 18:12:53.207055092 CET50290445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:12:53.210843086 CET44550291108.182.16.1192.168.2.5
                                      Jan 15, 2025 18:12:53.422818899 CET44550102161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:53.422981977 CET50102445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:53.423037052 CET50102445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:53.423105955 CET50102445192.168.2.5161.26.121.1
                                      Jan 15, 2025 18:12:53.427771091 CET44550102161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:53.427838087 CET44550102161.26.121.1192.168.2.5
                                      Jan 15, 2025 18:12:53.481789112 CET50295445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.486681938 CET44550295161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:53.486792088 CET50295445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.486864090 CET50295445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.487356901 CET50296445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.492305040 CET44550296161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:53.492381096 CET50296445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.492415905 CET50296445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.497195959 CET44550296161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:53.497813940 CET44550295161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:53.504425049 CET44550295161.26.121.2192.168.2.5
                                      Jan 15, 2025 18:12:53.504487038 CET50295445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:12:53.669018030 CET50299445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:53.674024105 CET44550299147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:53.674144983 CET50299445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:53.674233913 CET50299445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:12:53.678971052 CET44550299147.208.214.1192.168.2.5
                                      Jan 15, 2025 18:12:54.013114929 CET50300445192.168.2.515.1.53.127
                                      Jan 15, 2025 18:12:54.017995119 CET4455030015.1.53.127192.168.2.5
                                      Jan 15, 2025 18:12:54.018085003 CET50300445192.168.2.515.1.53.127
                                      Jan 15, 2025 18:12:54.018223047 CET50300445192.168.2.515.1.53.127
                                      Jan 15, 2025 18:12:54.018512964 CET50301445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.023066044 CET4455030015.1.53.127192.168.2.5
                                      Jan 15, 2025 18:12:54.023122072 CET50300445192.168.2.515.1.53.127
                                      Jan 15, 2025 18:12:54.023252010 CET4455030115.1.53.1192.168.2.5
                                      Jan 15, 2025 18:12:54.023341894 CET50301445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.023369074 CET50301445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.023777962 CET50302445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.028261900 CET4455030115.1.53.1192.168.2.5
                                      Jan 15, 2025 18:12:54.028328896 CET50301445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.028572083 CET4455030215.1.53.1192.168.2.5
                                      Jan 15, 2025 18:12:54.028635025 CET50302445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.028666973 CET50302445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:12:54.033406019 CET4455030215.1.53.1192.168.2.5
                                      Jan 15, 2025 18:12:54.356729984 CET50307445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:54.361588955 CET44550307152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:54.361689091 CET50307445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:54.361737013 CET50307445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:54.366549015 CET44550307152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:54.701725006 CET44550111193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:54.701901913 CET50111445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:54.701953888 CET50111445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:54.702018023 CET50111445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:54.706909895 CET44550111193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:54.706923962 CET44550111193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:54.778618097 CET50309445192.168.2.521.217.77.225
                                      Jan 15, 2025 18:12:54.783432007 CET4455030921.217.77.225192.168.2.5
                                      Jan 15, 2025 18:12:54.783502102 CET50309445192.168.2.521.217.77.225
                                      Jan 15, 2025 18:12:54.783526897 CET50309445192.168.2.521.217.77.225
                                      Jan 15, 2025 18:12:54.783651114 CET50310445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.788376093 CET4455031021.217.77.1192.168.2.5
                                      Jan 15, 2025 18:12:54.788532972 CET4455030921.217.77.225192.168.2.5
                                      Jan 15, 2025 18:12:54.788719893 CET50310445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.788825989 CET50309445192.168.2.521.217.77.225
                                      Jan 15, 2025 18:12:54.789099932 CET50310445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.789725065 CET50311445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.794243097 CET4455031021.217.77.1192.168.2.5
                                      Jan 15, 2025 18:12:54.794328928 CET50310445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.794503927 CET4455031121.217.77.1192.168.2.5
                                      Jan 15, 2025 18:12:54.794573069 CET50311445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.794595957 CET50311445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:12:54.799340010 CET4455031121.217.77.1192.168.2.5
                                      Jan 15, 2025 18:12:54.889489889 CET44550115133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:54.889559984 CET50115445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:54.889703989 CET50115445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:54.889925003 CET50115445192.168.2.5133.14.202.1
                                      Jan 15, 2025 18:12:54.894496918 CET44550115133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:54.894690037 CET44550115133.14.202.1192.168.2.5
                                      Jan 15, 2025 18:12:54.966095924 CET50315445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.971066952 CET44550315133.14.202.2192.168.2.5
                                      Jan 15, 2025 18:12:54.971143007 CET50315445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.971236944 CET50315445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.971972942 CET50316445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.976305008 CET44550315133.14.202.2192.168.2.5
                                      Jan 15, 2025 18:12:54.976387978 CET50315445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.976843119 CET44550316133.14.202.2192.168.2.5
                                      Jan 15, 2025 18:12:54.976916075 CET50316445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.976942062 CET50316445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:12:54.981816053 CET44550316133.14.202.2192.168.2.5
                                      Jan 15, 2025 18:12:55.622097969 CET50320445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:55.627094030 CET4455032082.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:55.627178907 CET50320445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:55.627247095 CET50320445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:12:55.632081032 CET4455032082.127.77.1192.168.2.5
                                      Jan 15, 2025 18:12:56.270818949 CET44550307152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:56.274051905 CET50307445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:56.274051905 CET50307445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:56.274051905 CET50307445192.168.2.5152.117.243.1
                                      Jan 15, 2025 18:12:56.281189919 CET44550307152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:56.281203985 CET44550307152.117.243.1192.168.2.5
                                      Jan 15, 2025 18:12:56.325217009 CET50327445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.330528021 CET44550327152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:56.330754042 CET50327445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.330754042 CET50327445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.331353903 CET50328445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.335963011 CET44550327152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:56.336183071 CET50327445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.336998940 CET44550328152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:56.337694883 CET50328445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.337694883 CET50328445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:56.342561960 CET44550328152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:56.673036098 CET44550130161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:56.673522949 CET50130445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:56.673522949 CET50130445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:56.673522949 CET50130445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:56.678448915 CET44550130161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:56.678482056 CET44550130161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:57.715687037 CET50343445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:57.720638990 CET44550343193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:57.723067045 CET50343445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:57.723067999 CET50343445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:12:57.727900028 CET44550343193.209.214.1192.168.2.5
                                      Jan 15, 2025 18:12:58.257627964 CET44550328152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:58.257848978 CET50328445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:58.257848978 CET50328445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:58.257848978 CET50328445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:12:58.262738943 CET44550328152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:58.262770891 CET44550328152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:12:58.698160887 CET4455014595.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:58.700650930 CET50145445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:58.700702906 CET50145445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:58.700731993 CET50145445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:12:58.705550909 CET4455014595.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:58.705569983 CET4455014595.129.132.1192.168.2.5
                                      Jan 15, 2025 18:12:59.684562922 CET50370445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:59.689450026 CET44550370161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:12:59.693999052 CET50370445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:59.694160938 CET50370445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:12:59.707369089 CET44550370161.4.168.1192.168.2.5
                                      Jan 15, 2025 18:13:00.619882107 CET44550160113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:13:00.619997025 CET50160445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:00.620171070 CET50160445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:00.620171070 CET50160445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:00.624967098 CET44550160113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:13:00.624986887 CET44550160113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:13:00.902868032 CET44550163104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:13:00.903269053 CET50163445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:13:00.903470993 CET50163445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:13:00.903470993 CET50163445192.168.2.5104.93.180.1
                                      Jan 15, 2025 18:13:00.909364939 CET44550163104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:13:00.909377098 CET44550163104.93.180.1192.168.2.5
                                      Jan 15, 2025 18:13:00.965745926 CET50392445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.970643044 CET44550392104.93.180.2192.168.2.5
                                      Jan 15, 2025 18:13:00.970717907 CET50392445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.970813036 CET50392445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.971204042 CET50393445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.975737095 CET44550392104.93.180.2192.168.2.5
                                      Jan 15, 2025 18:13:00.975799084 CET50392445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.976027966 CET44550393104.93.180.2192.168.2.5
                                      Jan 15, 2025 18:13:00.976121902 CET50393445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.976159096 CET50393445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:00.980922937 CET44550393104.93.180.2192.168.2.5
                                      Jan 15, 2025 18:13:01.262835979 CET50400445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:13:01.267709017 CET44550400152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:13:01.267805099 CET50400445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:13:01.267853975 CET50400445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:13:01.272635937 CET44550400152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:13:01.716089964 CET50409445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:13:01.720917940 CET4455040995.129.132.1192.168.2.5
                                      Jan 15, 2025 18:13:01.720987082 CET50409445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:13:01.721055031 CET50409445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:13:01.725837946 CET4455040995.129.132.1192.168.2.5
                                      Jan 15, 2025 18:13:02.323120117 CET44550175126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:13:02.323199034 CET50175445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:13:02.323247910 CET50175445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:13:02.323267937 CET50175445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:13:02.328063965 CET44550175126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:13:02.328074932 CET44550175126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:13:02.985224009 CET4455018060.213.189.1192.168.2.5
                                      Jan 15, 2025 18:13:02.985318899 CET50180445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:13:02.985414028 CET50180445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:13:02.985414982 CET50180445192.168.2.560.213.189.1
                                      Jan 15, 2025 18:13:02.990381956 CET4455018060.213.189.1192.168.2.5
                                      Jan 15, 2025 18:13:02.990416050 CET4455018060.213.189.1192.168.2.5
                                      Jan 15, 2025 18:13:03.043884039 CET50436445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.048922062 CET4455043660.213.189.2192.168.2.5
                                      Jan 15, 2025 18:13:03.048994064 CET50436445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.049088001 CET50436445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.049385071 CET50437445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.054224968 CET4455043760.213.189.2192.168.2.5
                                      Jan 15, 2025 18:13:03.054291010 CET50437445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.054316044 CET50437445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.054332018 CET4455043660.213.189.2192.168.2.5
                                      Jan 15, 2025 18:13:03.054387093 CET50436445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:03.059266090 CET4455043760.213.189.2192.168.2.5
                                      Jan 15, 2025 18:13:03.181055069 CET44550400152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:13:03.181152105 CET50400445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:13:03.181262016 CET50400445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:13:03.181334019 CET50400445192.168.2.5152.117.243.2
                                      Jan 15, 2025 18:13:03.186223984 CET44550400152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:13:03.186260939 CET44550400152.117.243.2192.168.2.5
                                      Jan 15, 2025 18:13:03.248141050 CET50442445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.253249884 CET44550442152.117.243.3192.168.2.5
                                      Jan 15, 2025 18:13:03.253331900 CET50442445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.253350019 CET50442445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.253843069 CET50443445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.258454084 CET44550442152.117.243.3192.168.2.5
                                      Jan 15, 2025 18:13:03.258667946 CET50442445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.258711100 CET44550443152.117.243.3192.168.2.5
                                      Jan 15, 2025 18:13:03.258780003 CET50443445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.258816957 CET50443445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:03.263720989 CET44550443152.117.243.3192.168.2.5
                                      Jan 15, 2025 18:13:03.371884108 CET44550183136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:13:03.372036934 CET50183445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:13:03.372136116 CET50183445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:13:03.372136116 CET50183445192.168.2.5136.243.125.2
                                      Jan 15, 2025 18:13:03.377090931 CET44550183136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:13:03.377129078 CET44550183136.243.125.2192.168.2.5
                                      Jan 15, 2025 18:13:03.434585094 CET50449445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.439640045 CET44550449136.243.125.3192.168.2.5
                                      Jan 15, 2025 18:13:03.439754009 CET50449445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.439807892 CET50449445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.440253019 CET50450445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.445208073 CET44550450136.243.125.3192.168.2.5
                                      Jan 15, 2025 18:13:03.445241928 CET44550449136.243.125.3192.168.2.5
                                      Jan 15, 2025 18:13:03.445317030 CET50450445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.445353031 CET50450445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.445369005 CET50449445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:03.450072050 CET44550450136.243.125.3192.168.2.5
                                      Jan 15, 2025 18:13:03.622076988 CET50455445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:03.626933098 CET44550455113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:13:03.627032995 CET50455445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:03.627077103 CET50455445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:03.631912947 CET44550455113.103.233.1192.168.2.5
                                      Jan 15, 2025 18:13:03.983339071 CET4455019129.147.136.1192.168.2.5
                                      Jan 15, 2025 18:13:03.983488083 CET50191445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:13:03.983537912 CET50191445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:13:03.983587980 CET50191445192.168.2.529.147.136.1
                                      Jan 15, 2025 18:13:03.995392084 CET4455019129.147.136.1192.168.2.5
                                      Jan 15, 2025 18:13:03.995404959 CET4455019129.147.136.1192.168.2.5
                                      Jan 15, 2025 18:13:04.901546955 CET4455019760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:13:04.901850939 CET50197445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:13:04.902025938 CET50197445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:13:04.902025938 CET50197445192.168.2.560.171.191.1
                                      Jan 15, 2025 18:13:04.906945944 CET4455019760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:13:04.906960964 CET4455019760.171.191.1192.168.2.5
                                      Jan 15, 2025 18:13:04.966243029 CET50498445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.971653938 CET4455049860.171.191.2192.168.2.5
                                      Jan 15, 2025 18:13:04.971765995 CET50498445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.971810102 CET50498445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.972172022 CET50499445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.976876020 CET4455049860.171.191.2192.168.2.5
                                      Jan 15, 2025 18:13:04.976996899 CET4455049960.171.191.2192.168.2.5
                                      Jan 15, 2025 18:13:04.977024078 CET50498445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.977071047 CET50499445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.977112055 CET50499445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:04.981940031 CET4455049960.171.191.2192.168.2.5
                                      Jan 15, 2025 18:13:05.324980974 CET50514445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:13:05.330183983 CET44550514126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:13:05.330952883 CET50514445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:13:05.330987930 CET50514445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:13:05.335778952 CET44550514126.96.38.1192.168.2.5
                                      Jan 15, 2025 18:13:07.010687113 CET4455021799.19.50.1192.168.2.5
                                      Jan 15, 2025 18:13:07.010744095 CET50217445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:13:07.026278019 CET4455021675.48.114.1192.168.2.5
                                      Jan 15, 2025 18:13:07.026377916 CET50216445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:13:08.238936901 CET50247445192.168.2.552.34.64.2
                                      Jan 15, 2025 18:13:08.238996983 CET50443445192.168.2.5152.117.243.3
                                      Jan 15, 2025 18:13:08.239057064 CET50316445192.168.2.5133.14.202.2
                                      Jan 15, 2025 18:13:08.239094019 CET50437445192.168.2.560.213.189.2
                                      Jan 15, 2025 18:13:08.239161015 CET50409445192.168.2.595.129.132.1
                                      Jan 15, 2025 18:13:08.239182949 CET50265445192.168.2.559.178.161.2
                                      Jan 15, 2025 18:13:08.239239931 CET50255445192.168.2.5188.228.236.1
                                      Jan 15, 2025 18:13:08.239269972 CET50296445192.168.2.5161.26.121.2
                                      Jan 15, 2025 18:13:08.239310026 CET50216445192.168.2.575.48.114.1
                                      Jan 15, 2025 18:13:08.239335060 CET50217445192.168.2.599.19.50.1
                                      Jan 15, 2025 18:13:08.239367962 CET50227445192.168.2.543.89.144.1
                                      Jan 15, 2025 18:13:08.239392996 CET50233445192.168.2.5198.243.245.1
                                      Jan 15, 2025 18:13:08.239419937 CET50241445192.168.2.5194.81.103.1
                                      Jan 15, 2025 18:13:08.239449024 CET50250445192.168.2.5180.35.1.1
                                      Jan 15, 2025 18:13:08.239480972 CET50262445192.168.2.5107.54.42.1
                                      Jan 15, 2025 18:13:08.239507914 CET50273445192.168.2.5136.227.119.1
                                      Jan 15, 2025 18:13:08.239536047 CET50274445192.168.2.541.167.36.1
                                      Jan 15, 2025 18:13:08.239558935 CET50279445192.168.2.574.80.92.3
                                      Jan 15, 2025 18:13:08.239635944 CET50283445192.168.2.57.191.5.1
                                      Jan 15, 2025 18:13:08.239662886 CET50291445192.168.2.5108.182.16.1
                                      Jan 15, 2025 18:13:08.239686966 CET50299445192.168.2.5147.208.214.1
                                      Jan 15, 2025 18:13:08.239713907 CET50302445192.168.2.515.1.53.1
                                      Jan 15, 2025 18:13:08.239741087 CET50311445192.168.2.521.217.77.1
                                      Jan 15, 2025 18:13:08.239768028 CET50320445192.168.2.582.127.77.1
                                      Jan 15, 2025 18:13:08.239797115 CET50393445192.168.2.5104.93.180.2
                                      Jan 15, 2025 18:13:08.239823103 CET50343445192.168.2.5193.209.214.1
                                      Jan 15, 2025 18:13:08.239859104 CET50370445192.168.2.5161.4.168.1
                                      Jan 15, 2025 18:13:08.239891052 CET50450445192.168.2.5136.243.125.3
                                      Jan 15, 2025 18:13:08.239922047 CET50455445192.168.2.5113.103.233.1
                                      Jan 15, 2025 18:13:08.240022898 CET50499445192.168.2.560.171.191.2
                                      Jan 15, 2025 18:13:08.240091085 CET50514445192.168.2.5126.96.38.1
                                      Jan 15, 2025 18:14:08.270948887 CET50619445192.168.2.5218.181.19.94
                                      Jan 15, 2025 18:14:08.392841101 CET44550619218.181.19.94192.168.2.5
                                      Jan 15, 2025 18:14:08.395117044 CET50619445192.168.2.5218.181.19.94
                                      Jan 15, 2025 18:14:08.395272970 CET50619445192.168.2.5218.181.19.94
                                      Jan 15, 2025 18:14:08.395293951 CET50623445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.400135994 CET44550623218.181.19.1192.168.2.5
                                      Jan 15, 2025 18:14:08.400320053 CET44550619218.181.19.94192.168.2.5
                                      Jan 15, 2025 18:14:08.400412083 CET50619445192.168.2.5218.181.19.94
                                      Jan 15, 2025 18:14:08.400475979 CET50623445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.400475979 CET50623445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.400995970 CET50624445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.405633926 CET44550623218.181.19.1192.168.2.5
                                      Jan 15, 2025 18:14:08.405733109 CET50623445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.405828953 CET44550624218.181.19.1192.168.2.5
                                      Jan 15, 2025 18:14:08.405903101 CET50624445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.405945063 CET50624445192.168.2.5218.181.19.1
                                      Jan 15, 2025 18:14:08.410748959 CET44550624218.181.19.1192.168.2.5
                                      Jan 15, 2025 18:14:10.278495073 CET50644445192.168.2.5178.219.104.9
                                      Jan 15, 2025 18:14:10.283432007 CET44550644178.219.104.9192.168.2.5
                                      Jan 15, 2025 18:14:10.283504009 CET50644445192.168.2.5178.219.104.9
                                      Jan 15, 2025 18:14:10.283552885 CET50644445192.168.2.5178.219.104.9
                                      Jan 15, 2025 18:14:10.283830881 CET50645445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.288503885 CET44550644178.219.104.9192.168.2.5
                                      Jan 15, 2025 18:14:10.288583994 CET50644445192.168.2.5178.219.104.9
                                      Jan 15, 2025 18:14:10.288712978 CET44550645178.219.104.1192.168.2.5
                                      Jan 15, 2025 18:14:10.288785934 CET50645445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.288844109 CET50645445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.289123058 CET50646445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.293724060 CET44550645178.219.104.1192.168.2.5
                                      Jan 15, 2025 18:14:10.294014931 CET44550645178.219.104.1192.168.2.5
                                      Jan 15, 2025 18:14:10.294044971 CET44550646178.219.104.1192.168.2.5
                                      Jan 15, 2025 18:14:10.294073105 CET50645445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.294110060 CET50646445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.294145107 CET50646445192.168.2.5178.219.104.1
                                      Jan 15, 2025 18:14:10.298938990 CET44550646178.219.104.1192.168.2.5

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:12:12:01
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\loaddll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:loaddll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll"
                                      Imagebase:0xf60000
                                      File size:126'464 bytes
                                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:12:12:01
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:12:12:01
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:12:12:01
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe C:\Users\user\Desktop\txWVWM8Kx4.dll,PlayGame
                                      Imagebase:0x220000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:12:12:01
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",#1
                                      Imagebase:0x220000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:12:12:01
                                      Start date:15/01/2025
                                      Path:C:\Windows\mssecsvc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\mssecsvc.exe
                                      Imagebase:0x400000
                                      File size:3'723'264 bytes
                                      MD5 hash:A75A57A712300662CE3FF1447A0C4805
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2053811513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.2053811513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2053681836.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      Reputation:low
                                      Has exited:true

                                      Target ID:7
                                      Start time:12:12:02
                                      Start date:15/01/2025
                                      Path:C:\Windows\mssecsvc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                      Imagebase:0x400000
                                      File size:3'723'264 bytes
                                      MD5 hash:A75A57A712300662CE3FF1447A0C4805
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2056001605.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2056132349.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.2056132349.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2693479834.0000000001E83000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2693479834.0000000001E83000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2693749913.00000000023A0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2693749913.00000000023A0000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                      Reputation:low
                                      Has exited:true

                                      Target ID:8
                                      Start time:12:12:02
                                      Start date:15/01/2025
                                      Path:C:\Windows\tasksche.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\tasksche.exe /i
                                      Imagebase:0x400000
                                      File size:3'514'368 bytes
                                      MD5 hash:79409B6F48460807480E4A574312D85F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmp, Author: us-cert code analysis team
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2058421206.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                      • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 93%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:9
                                      Start time:12:12:02
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:cmd.exe /c "C:\ProgramData\dsvqhifq359\tasksche.exe"
                                      Imagebase:0x7ff630150000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:12:12:02
                                      Start date:15/01/2025
                                      Path:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Imagebase:0x400000
                                      File size:3'514'368 bytes
                                      MD5 hash:79409B6F48460807480E4A574312D85F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2068015450.000000000040F000.00000004.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2060906503.000000000040E000.00000008.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: us-cert code analysis team
                                      • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\ProgramData\dsvqhifq359\tasksche.exe, Author: ReversingLabs
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 93%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:12:12:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\attrib.exe
                                      Wow64 process (32bit):true
                                      Commandline:attrib +h .
                                      Imagebase:0x320000
                                      File size:19'456 bytes
                                      MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:12
                                      Start time:12:12:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls . /grant Everyone:F /T /C /Q
                                      Imagebase:0x780000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:13
                                      Start time:12:12:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:12:12:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:15
                                      Start time:12:12:04
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe "C:\Users\user\Desktop\txWVWM8Kx4.dll",PlayGame
                                      Imagebase:0x220000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:12:12:04
                                      Start date:15/01/2025
                                      Path:C:\Windows\mssecsvc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\mssecsvc.exe
                                      Imagebase:0x400000
                                      File size:3'723'264 bytes
                                      MD5 hash:A75A57A712300662CE3FF1447A0C4805
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000010.00000002.2086246634.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000010.00000002.2086390129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000010.00000002.2086390129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000010.00000000.2082010028.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000010.00000000.2082127312.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000010.00000000.2082127312.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      Has exited:true

                                      Target ID:17
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\Windows\tasksche.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\tasksche.exe /i
                                      Imagebase:0x400000
                                      File size:3'514'368 bytes
                                      MD5 hash:79409B6F48460807480E4A574312D85F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000011.00000000.2085577185.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000011.00000002.3127527649.000000000040F000.00000004.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                      Has exited:true

                                      Target ID:18
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:cmd.exe /c "C:\ProgramData\dsvqhifq359\tasksche.exe"
                                      Imagebase:0x7ff630150000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Imagebase:0x400000
                                      File size:3'514'368 bytes
                                      MD5 hash:79409B6F48460807480E4A574312D85F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000013.00000002.2092835134.000000000040F000.00000004.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000013.00000000.2087719412.000000000040E000.00000008.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      Has exited:true

                                      Target ID:20
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\attrib.exe
                                      Wow64 process (32bit):true
                                      Commandline:attrib +h .
                                      Imagebase:0x320000
                                      File size:19'456 bytes
                                      MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls . /grant Everyone:F /T /C /Q
                                      Imagebase:0x780000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:12:12:05
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:12:12:54
                                      Start date:15/01/2025
                                      Path:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Imagebase:0x400000
                                      File size:3'514'368 bytes
                                      MD5 hash:79409B6F48460807480E4A574312D85F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000001A.00000002.2582916598.000000000040F000.00000004.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000001A.00000000.2577645149.000000000040E000.00000008.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      Has exited:true

                                      Target ID:27
                                      Start time:12:12:54
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\attrib.exe
                                      Wow64 process (32bit):true
                                      Commandline:attrib +h .
                                      Imagebase:0x320000
                                      File size:19'456 bytes
                                      MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:12:12:54
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls . /grant Everyone:F /T /C /Q
                                      Imagebase:0x780000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:12:12:54
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:12:12:54
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:12:12:56
                                      Start date:15/01/2025
                                      Path:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\ProgramData\dsvqhifq359\tasksche.exe
                                      Imagebase:0x400000
                                      File size:3'514'368 bytes
                                      MD5 hash:79409B6F48460807480E4A574312D85F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000001F.00000002.2605730753.000000000040F000.00000004.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000001F.00000000.2599504308.000000000040E000.00000008.00000001.01000000.00000008.sdmp, Author: us-cert code analysis team
                                      Has exited:true

                                      Target ID:32
                                      Start time:12:12:57
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\attrib.exe
                                      Wow64 process (32bit):true
                                      Commandline:attrib +h .
                                      Imagebase:0x320000
                                      File size:19'456 bytes
                                      MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:12:12:57
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls . /grant Everyone:F /T /C /Q
                                      Imagebase:0x780000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:12:12:57
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:12:12:57
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:36
                                      Start time:12:13:46
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\attrib.exe
                                      Wow64 process (32bit):true
                                      Commandline:attrib +h .
                                      Imagebase:0x320000
                                      File size:19'456 bytes
                                      MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:37
                                      Start time:12:13:46
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls . /grant Everyone:F /T /C /Q
                                      Imagebase:0x780000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Target ID:38
                                      Start time:12:13:46
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:39
                                      Start time:12:13:46
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Target ID:40
                                      Start time:12:13:49
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\attrib.exe
                                      Wow64 process (32bit):true
                                      Commandline:attrib +h .
                                      Imagebase:0x320000
                                      File size:19'456 bytes
                                      MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:41
                                      Start time:12:13:49
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls . /grant Everyone:F /T /C /Q
                                      Imagebase:0x780000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Target ID:42
                                      Start time:12:13:49
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:43
                                      Start time:12:13:49
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:77.5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:63.2%
                                        Total number of Nodes:38
                                        Total number of Limit Nodes:2
                                        execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 97 407c40 sprintf OpenSCManagerA 91->97 93 407f25 102 407ce0 GetModuleHandleW 93->102 96->90 98 407c74 CreateServiceA 97->98 99 407cca 97->99 100 407cbb CloseServiceHandle 98->100 101 407cad StartServiceA CloseServiceHandle 98->101 99->93 100->93 101->100 103 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 102->103 104 407f08 102->104 103->104 105 407d49 103->105 104->79 105->104 106 407d69 FindResourceA 105->106 106->104 107 407d84 LoadResource 106->107 107->104 108 407d94 LockResource 107->108 108->104 109 407da7 SizeofResource 108->109 109->104 110 407db9 sprintf sprintf MoveFileExA CreateFileA 109->110 110->104 111 407e54 WriteFile CloseHandle CreateProcessA 110->111 111->104 112 407ef2 CloseHandle CloseHandle 111->112 112->104

                                        Callgraph

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                        • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                        • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                        • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                        • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                        • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                        • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                        • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                        • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                        • sprintf.MSVCRT ref: 00407E01
                                        • sprintf.MSVCRT ref: 00407E18
                                        • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                        • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                        • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                        • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                        • CreateProcessA.KERNELBASE ref: 00407EE8
                                        • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                        • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2059135210.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000005.00000002.2059115177.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059156323.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059350693.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                        • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                        • API String ID: 4281112323-1507730452
                                        • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                        • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                        Control-flow Graph

                                        APIs
                                        • sprintf.MSVCRT ref: 00407C56
                                        • OpenSCManagerA.SECHOST(00000000,00000000,000F003F), ref: 00407C68
                                        • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2059135210.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000005.00000002.2059115177.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059156323.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059350693.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                        • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                        • API String ID: 3340711343-4063779371
                                        • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                        • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2059135210.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000005.00000002.2059115177.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059156323.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059350693.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                        • String ID:
                                        • API String ID: 801014965-0
                                        • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                        • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                        Control-flow Graph

                                        APIs
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                        • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                        • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2059135210.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000005.00000002.2059115177.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059156323.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059350693.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleOpen
                                        • String ID:
                                        • API String ID: 435140893-0
                                        • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                        • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                        • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                        • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • __p___argc.MSVCRT ref: 004080A5
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                        • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                        • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                        • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2059135210.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000005.00000002.2059115177.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059156323.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059180156.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059350693.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000005.00000002.2059483616.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                        • String ID: mssecsvc2.0
                                        • API String ID: 4274534310-3729025388
                                        • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                        • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                        Execution Graph

                                        Execution Coverage:34.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:36
                                        Total number of Limit Nodes:2

                                        Callgraph

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • __p___argc.MSVCRT ref: 004080A5
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                        • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                        • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                        • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2692391389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2692377736.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692406078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692468126.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692484546.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                        • String ID: mssecsvc2.0
                                        • API String ID: 4274534310-3729025388
                                        • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                        • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                        Control-flow Graph

                                        APIs
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                        • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                        • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2692391389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2692377736.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692406078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692468126.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692484546.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleOpen
                                        • String ID:
                                        • API String ID: 435140893-0
                                        • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                        • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                        • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                        • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                        Control-flow Graph

                                        APIs
                                        • sprintf.MSVCRT ref: 00407C56
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                        • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2692391389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2692377736.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692406078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692468126.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692484546.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                        • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                        • API String ID: 3340711343-4063779371
                                        • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                        • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                        APIs
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                        • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                        • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                        • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                        • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                        • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                        • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                        • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                        • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                        • sprintf.MSVCRT ref: 00407E01
                                        • sprintf.MSVCRT ref: 00407E18
                                        • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2692391389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2692377736.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692406078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692468126.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692484546.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                        • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                        • API String ID: 4072214828-1507730452
                                        • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                        • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2692391389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2692377736.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692406078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692420438.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692455039.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692468126.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692484546.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000007.00000002.2692571152.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                        • String ID:
                                        • API String ID: 801014965-0
                                        • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                        • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                        Execution Graph

                                        Execution Coverage:12%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:20.5%
                                        Total number of Nodes:667
                                        Total number of Limit Nodes:13
                                        execution_graph 2833 402185 VirtualFree 2313 4077c7 __set_app_type __p__fmode __p__commode 2314 407829 2313->2314 2315 407831 __setusermatherr 2314->2315 2316 40783d 2314->2316 2315->2316 2325 40792a _controlfp 2316->2325 2318 407842 _initterm __getmainargs _initterm 2319 407896 GetStartupInfoA 2318->2319 2321 4078ca GetModuleHandleA 2319->2321 2326 401fe7 GetModuleFileNameA 2321->2326 2325->2318 2362 401225 GetComputerNameW wcslen 2326->2362 2329 40203b __p___argv strcmp 2330 40208e strrchr 2329->2330 2331 402056 2329->2331 2332 4020b4 SetCurrentDirectoryA 2330->2332 2333 4020a5 strrchr 2330->2333 2370 401b5f MultiByteToWideChar GetWindowsDirectoryW swprintf GetFileAttributesW 2331->2370 2393 4010fd wcscat 2332->2393 2333->2332 2336 4020c8 2401 401e9e 2336->2401 2338 402061 CopyFileA GetFileAttributesA 2338->2330 2339 402081 2338->2339 2384 401f5d GetFullPathNameA 2339->2384 2345 402165 exit _XcptFilter 2347 401064 6 API calls 2348 4020f2 2347->2348 2415 40170a 2348->2415 2352 402109 2428 401437 2352->2428 2355 402150 2456 40137a 2355->2456 2363 4012a0 srand rand 2362->2363 2364 401280 2362->2364 2366 4012c0 rand 2363->2366 2367 4012d6 2363->2367 2365 401286 wcslen 2364->2365 2365->2363 2365->2365 2366->2366 2366->2367 2368 4012f1 __p___argc 2367->2368 2369 4012dd rand 2367->2369 2368->2329 2368->2330 2369->2367 2371 401c40 swprintf 2370->2371 2372 401c1b 2370->2372 2374 401af6 7 API calls 2371->2374 2473 401af6 CreateDirectoryW SetCurrentDirectoryW 2372->2473 2376 401c6b 2374->2376 2377 401af6 7 API calls 2376->2377 2378 401c38 2376->2378 2379 401c88 2377->2379 2378->2330 2378->2338 2379->2378 2380 401c8f GetTempPathW wcsrchr 2379->2380 2381 401cb4 wcsrchr 2380->2381 2382 401cc5 2380->2382 2381->2382 2383 401af6 7 API calls 2382->2383 2383->2378 2478 401ce8 OpenSCManagerA 2384->2478 2387 401fb6 2389 401064 6 API calls 2387->2389 2392 401fd9 2387->2392 2390 401fcb 2389->2390 2391 401eff 4 API calls 2390->2391 2390->2392 2391->2392 2392->2330 2392->2345 2394 40115c 2393->2394 2395 40117a RegCreateKeyW 2394->2395 2396 4011cc RegQueryValueExA 2394->2396 2397 40118e GetCurrentDirectoryA strlen RegSetValueExA 2394->2397 2398 40121a 2394->2398 2395->2394 2399 401200 RegCloseKey 2396->2399 2400 4011f3 SetCurrentDirectoryA 2396->2400 2397->2399 2398->2336 2399->2394 2399->2398 2400->2399 2491 401000 2401->2491 2404 401ed0 rand strcpy 2406 401000 4 API calls 2404->2406 2405 401efa 2407 401064 CreateProcessA 2405->2407 2406->2405 2408 4010b2 2407->2408 2409 4010f7 2407->2409 2410 4010e3 CloseHandle CloseHandle 2408->2410 2411 4010b7 WaitForSingleObject 2408->2411 2409->2347 2410->2409 2412 4010d2 2411->2412 2413 4010c7 TerminateProcess 2411->2413 2412->2410 2414 4010d7 GetExitCodeProcess 2412->2414 2413->2412 2414->2410 2500 401a45 2415->2500 2417 4017d3 2417->2345 2422 4012fd 2417->2422 2419 401727 LoadLibraryA 2419->2417 2420 40173c 7 API calls 2419->2420 2420->2417 2421 4017a7 2420->2421 2421->2417 2423 401307 __EH_prolog 2422->2423 2505 4017dd InitializeCriticalSection 2423->2505 2425 401317 2506 4017dd InitializeCriticalSection 2425->2506 2427 401324 2427->2352 2507 401861 2428->2507 2431 401485 2431->2355 2435 4014a6 CreateFileA 2431->2435 2432 40145d GlobalAlloc 2432->2431 2434 401476 GlobalAlloc 2432->2434 2433 401861 11 API calls 2433->2432 2434->2431 2436 4016d0 _local_unwind2 2435->2436 2437 401524 GetFileSizeEx 2435->2437 2439 4016f9 2436->2439 2437->2436 2438 401538 2437->2438 2438->2436 2440 401547 ReadFile 2438->2440 2439->2355 2464 4021bd 2439->2464 2440->2436 2441 401564 memcmp 2440->2441 2441->2436 2442 401582 ReadFile 2441->2442 2442->2436 2443 40159f 2442->2443 2443->2436 2444 4015b0 ReadFile 2443->2444 2444->2436 2445 4015cb ReadFile 2444->2445 2445->2436 2446 4015e8 ReadFile 2445->2446 2446->2436 2447 401605 2446->2447 2447->2436 2537 4019e1 2447->2537 2452 40167a ReadFile 2452->2436 2453 401698 2452->2453 2453->2436 2550 403a77 2453->2550 2457 401384 __EH_prolog 2456->2457 2592 4013ce 2457->2592 2459 40139d ctype 2601 40181b DeleteCriticalSection 2459->2601 2461 4013b5 2602 40181b DeleteCriticalSection 2461->2602 2463 4013c1 2463->2345 2603 4021e9 2464->2603 2467 402924 2468 4029a5 SetLastError 2467->2468 2470 402940 2467->2470 2469 4029af 2468->2469 2469->2355 2470->2468 2471 402981 _stricmp 2470->2471 2472 40295c 2470->2472 2471->2470 2471->2472 2472->2468 2472->2469 2474 401b27 2473->2474 2475 401b18 CreateDirectoryW SetCurrentDirectoryW 2473->2475 2474->2371 2474->2378 2475->2474 2476 401b2b GetFileAttributesW SetFileAttributesW 2475->2476 2476->2474 2477 401b42 swprintf 2476->2477 2477->2474 2479 401d12 OpenServiceA 2478->2479 2480 401d0b 2478->2480 2481 401d45 sprintf CreateServiceA 2479->2481 2482 401d2e StartServiceA CloseServiceHandle 2479->2482 2480->2387 2486 401eff sprintf 2480->2486 2484 401d81 StartServiceA CloseServiceHandle 2481->2484 2485 401d98 2481->2485 2483 401d9b CloseServiceHandle 2482->2483 2483->2480 2484->2485 2485->2483 2487 401f26 OpenMutexA 2486->2487 2488 401f4c 2486->2488 2489 401f51 CloseHandle 2487->2489 2490 401f3b Sleep 2487->2490 2488->2387 2489->2488 2490->2487 2490->2488 2492 40100a fopen 2491->2492 2494 401029 2492->2494 2495 40102d 2492->2495 2494->2404 2494->2405 2496 401047 fwrite 2495->2496 2497 40103f fread 2495->2497 2498 40104d fclose 2496->2498 2497->2498 2498->2494 2501 401a55 LoadLibraryA 2500->2501 2502 401711 2500->2502 2503 401ac8 2501->2503 2504 401a6a 6 API calls 2501->2504 2502->2417 2502->2419 2503->2502 2504->2503 2505->2425 2506->2427 2517 40182c 2507->2517 2511 401890 2521 4018f9 CreateFileA 2511->2521 2512 401875 CryptImportKey 2515 4018a3 2512->2515 2514 401448 2514->2431 2514->2432 2514->2433 2515->2514 2530 4018b9 2515->2530 2518 401833 CryptAcquireContextA 2517->2518 2519 401853 2518->2519 2520 401859 2518->2520 2519->2518 2519->2520 2520->2511 2520->2512 2520->2515 2522 4019a0 _local_unwind2 2521->2522 2523 401948 GetFileSize 2521->2523 2524 4018a0 2522->2524 2523->2522 2525 40195a 2523->2525 2524->2515 2525->2522 2526 401962 GlobalAlloc 2525->2526 2526->2522 2527 401973 ReadFile 2526->2527 2527->2522 2528 401987 CryptImportKey 2527->2528 2528->2522 2529 40199d 2528->2529 2529->2522 2531 4018c3 CryptDestroyKey 2530->2531 2532 4018ce 2530->2532 2531->2532 2533 4018e0 2532->2533 2534 4018d5 CryptDestroyKey 2532->2534 2535 4018f4 2533->2535 2536 4018e7 CryptReleaseContext 2533->2536 2534->2533 2535->2514 2536->2535 2538 401642 2537->2538 2539 4019ee EnterCriticalSection CryptDecrypt 2537->2539 2538->2436 2542 402a76 2538->2542 2540 401a13 LeaveCriticalSection 2539->2540 2541 401a1d LeaveCriticalSection memcpy 2539->2541 2540->2538 2541->2538 2543 402a87 ??0exception@@QAE@ABQBD _CxxThrowException 2542->2543 2544 402aa9 2542->2544 2543->2544 2545 402ae1 2544->2545 2547 402abf ??0exception@@QAE@ABQBD _CxxThrowException 2544->2547 2546 402b13 memcpy memcpy 2545->2546 2548 402af1 ??0exception@@QAE@ABQBD _CxxThrowException 2545->2548 2549 401666 GlobalAlloc 2546->2549 2547->2545 2548->2546 2549->2436 2549->2452 2551 403aa5 2550->2551 2552 403a89 ??0exception@@QAE@ABQBD _CxxThrowException 2550->2552 2553 403bba ??0exception@@QAE@ABQBD _CxxThrowException 2551->2553 2554 403ac2 2551->2554 2552->2551 2555 403b28 2554->2555 2560 403ac8 2554->2560 2557 403b8b 2555->2557 2563 403b3a 2555->2563 2556 4016c5 2556->2436 2557->2556 2559 403797 5 API calls 2557->2559 2559->2557 2560->2556 2567 403797 2560->2567 2575 403a28 2560->2575 2563->2556 2565 403a28 2 API calls 2563->2565 2578 40350f 2563->2578 2566 403b5a memcpy 2565->2566 2566->2556 2566->2563 2568 4037c4 2567->2568 2569 4037a8 ??0exception@@QAE@ABQBD _CxxThrowException 2567->2569 2570 4037cf 2568->2570 2573 4037e1 2568->2573 2569->2568 2586 4031bc 2570->2586 2572 4037dc 2572->2560 2573->2572 2574 403923 memcpy 2573->2574 2574->2572 2574->2573 2576 403a51 memcpy 2575->2576 2577 403a35 ??0exception@@QAE@ABQBD _CxxThrowException 2575->2577 2576->2556 2576->2560 2577->2576 2579 403520 ??0exception@@QAE@ABQBD _CxxThrowException 2578->2579 2580 40353c 2578->2580 2579->2580 2581 403547 2580->2581 2583 403559 2580->2583 2589 402e7e 2581->2589 2584 403554 2583->2584 2585 403695 memcpy 2583->2585 2584->2563 2585->2583 2585->2584 2587 4031ce ??0exception@@QAE@ABQBD _CxxThrowException 2586->2587 2588 4031ea 2586->2588 2587->2588 2588->2572 2590 402e90 ??0exception@@QAE@ABQBD _CxxThrowException 2589->2590 2591 402eac 2589->2591 2590->2591 2591->2584 2593 4018b9 ctype 3 API calls 2592->2593 2594 4013db 2593->2594 2595 4018b9 ctype 3 API calls 2594->2595 2596 4013e3 2595->2596 2597 401410 2596->2597 2599 401401 GlobalFree 2596->2599 2598 401430 2597->2598 2600 401421 GlobalFree 2597->2600 2598->2459 2599->2597 2600->2598 2601->2461 2602->2463 2627 402457 2603->2627 2605 402200 2606 402457 SetLastError 2605->2606 2612 402214 SetLastError 2605->2612 2624 40213f 2605->2624 2609 402235 2606->2609 2608 40228c GetModuleHandleA 2610 40229f 2608->2610 2608->2624 2609->2608 2609->2612 2609->2624 2611 40230f GetProcessHeap HeapAlloc 2610->2611 2610->2612 2610->2624 2611->2612 2613 40233d 2611->2613 2612->2624 2614 402457 SetLastError 2613->2614 2615 402382 2614->2615 2616 402436 2615->2616 2618 40239d memcpy 2615->2618 2652 4029cc 2616->2652 2630 402470 2618->2630 2620 4023c7 2620->2616 2636 4027df 2620->2636 2624->2355 2624->2467 2625 402400 2625->2616 2625->2624 2626 40242b SetLastError 2625->2626 2626->2616 2628 402461 SetLastError 2627->2628 2629 40246c 2627->2629 2628->2605 2629->2605 2631 402499 2630->2631 2633 40253f 2630->2633 2632 402457 SetLastError 2631->2632 2631->2633 2634 4024c8 memset 2631->2634 2635 402512 memcpy 2631->2635 2632->2631 2633->2620 2634->2631 2635->2631 2637 40280a IsBadReadPtr 2636->2637 2644 4023f5 2636->2644 2643 402820 2637->2643 2637->2644 2638 402846 realloc 2639 4028ec SetLastError 2638->2639 2638->2643 2639->2644 2641 4028d6 IsBadReadPtr 2641->2643 2641->2644 2642 402909 SetLastError 2642->2644 2643->2638 2643->2639 2643->2641 2643->2642 2643->2644 2644->2616 2646 40254b 2644->2646 2648 402579 2646->2648 2647 40267b VirtualProtect 2650 40263e 2647->2650 2648->2650 2651 40262e 2648->2651 2658 40267b 2648->2658 2650->2625 2651->2647 2653 402a43 2652->2653 2654 4029d8 2652->2654 2653->2624 2655 402a12 free 2654->2655 2657 402a1d GetProcessHeap HeapFree 2654->2657 2655->2657 2657->2653 2659 40268a 2658->2659 2660 402692 2658->2660 2659->2648 2660->2659 2661 402705 VirtualProtect 2660->2661 2661->2659 2705 40714c 2706 407155 2705->2706 2707 406a97 2 API calls 2706->2707 2708 40721d 2706->2708 2716 40715e 2706->2716 2707->2708 2709 40729c 2708->2709 2711 407263 2708->2711 2708->2716 2710 4072c7 strcpy 2709->2710 2713 4072a1 2709->2713 2714 407343 2710->2714 2715 4072da 2710->2715 2712 407070 7 API calls 2711->2712 2711->2716 2712->2716 2713->2716 2720 4073c8 ??2@YAPAXI 2713->2720 2726 4073d5 2713->2726 2717 40737b wsprintfA 2714->2717 2718 4072e1 wsprintfA 2714->2718 2715->2718 2719 407070 7 API calls 2717->2719 2732 407070 2718->2732 2722 40730f CreateFileA 2719->2722 2720->2726 2722->2713 2725 407421 2728 407460 CloseHandle 2725->2728 2729 407469 2725->2729 2726->2725 2727 4073fb WriteFile 2726->2727 2730 40743c SetFileTime 2726->2730 2742 406880 2726->2742 2727->2725 2727->2726 2728->2729 2731 406a97 2 API calls 2729->2731 2730->2725 2731->2716 2733 407082 GetFileAttributesA 2732->2733 2736 407097 2732->2736 2734 40708e CreateDirectoryA 2733->2734 2733->2736 2734->2736 2735 407132 2735->2722 2736->2735 2737 4070bf memcpy 2736->2737 2738 4070e4 2736->2738 2737->2738 2739 407102 strcat GetFileAttributesA 2738->2739 2740 4070f3 strcpy 2738->2740 2739->2735 2741 407123 CreateDirectoryA 2739->2741 2740->2739 2741->2735 2747 406897 2742->2747 2744 406a79 2746 4068a0 2744->2746 2746->2726 2747->2746 2748 406908 2747->2748 2748->2744 2748->2747 2749 405d0e 2748->2749 2753 405d8a 2748->2753 2750 405d1c 2749->2750 2751 405d52 2749->2751 2750->2751 2752 405d47 SetFilePointer 2750->2752 2751->2748 2752->2751 2754 405dbe memcpy 2753->2754 2755 405d9e ReadFile 2753->2755 2756 405db5 2754->2756 2755->2756 2756->2748 2760 40774c ??1type_info@@UAE 2761 407762 2760->2761 2762 40775b ??3@YAXPAX 2760->2762 2762->2761 2834 40790c _exit 2763 4043d1 2772 4043f2 2763->2772 2764 403bd6 2 API calls 2771 4049ec 2764->2771 2765 4045f6 memcpy 2765->2772 2767 4049c2 2767->2764 2768 404a94 2770 403bd6 2 API calls 2768->2770 2770->2771 2772->2765 2772->2767 2772->2768 2773 404b44 2772->2773 2775 403bd6 2772->2775 2781 403cfc 2772->2781 2774 403bd6 2 API calls 2773->2774 2774->2767 2776 403bf6 2775->2776 2777 403c35 memcpy 2776->2777 2779 403c4a 2776->2779 2777->2779 2778 403cb4 2778->2772 2779->2778 2780 403c9f memcpy 2779->2780 2780->2778 2785 403d2f 2781->2785 2782 403bd6 2 API calls 2784 40427f 2782->2784 2783 403f69 2783->2782 2786 403f71 2783->2786 2784->2772 2785->2783 2785->2786 2787 403bd6 memcpy memcpy 2785->2787 2786->2772 2787->2785 2788 402a53 2789 402a5b ctype 2788->2789 2790 402a62 ??3@YAXPAX 2789->2790 2791 402a69 2789->2791 2790->2791 2835 406213 2836 406245 2835->2836 2877 405e27 2836->2877 2839 405e27 2 API calls 2840 406264 2839->2840 2841 405e27 2 API calls 2840->2841 2842 406278 2841->2842 2843 405e27 2 API calls 2842->2843 2844 40628c 2843->2844 2882 405e6b 2844->2882 2846 4062a0 2847 405e6b 2 API calls 2846->2847 2848 4062c0 2847->2848 2849 405e6b 2 API calls 2848->2849 2850 4062d5 2849->2850 2851 405e6b 2 API calls 2850->2851 2852 4062e9 2851->2852 2853 405e27 2 API calls 2852->2853 2854 4062fd 2853->2854 2855 405e27 2 API calls 2854->2855 2856 406311 2855->2856 2857 405e27 2 API calls 2856->2857 2858 406325 2857->2858 2859 405e27 2 API calls 2858->2859 2860 406339 2859->2860 2861 405e27 2 API calls 2860->2861 2862 40634d 2861->2862 2863 405e6b 2 API calls 2862->2863 2864 406361 2863->2864 2865 405e6b 2 API calls 2864->2865 2870 406375 2865->2870 2866 406486 2867 40641e 2867->2866 2872 406464 2867->2872 2873 405d0e SetFilePointer 2867->2873 2868 4063f6 2868->2867 2875 405d8a 2 API calls 2868->2875 2869 4063be 2869->2867 2869->2868 2871 405d0e SetFilePointer 2869->2871 2870->2867 2870->2869 2874 405d8a 2 API calls 2870->2874 2871->2868 2872->2866 2876 405d8a 2 API calls 2872->2876 2873->2872 2874->2869 2875->2867 2876->2866 2891 405def 2877->2891 2879 405e38 2880 405def 2 API calls 2879->2880 2881 405e4d 2879->2881 2880->2881 2881->2839 2883 405def 2 API calls 2882->2883 2884 405e7d 2883->2884 2885 405def 2 API calls 2884->2885 2889 405e90 2884->2889 2885->2889 2886 405def 2 API calls 2888 405ea8 2886->2888 2887 405ec0 2887->2846 2888->2887 2890 405def 2 API calls 2888->2890 2889->2886 2889->2888 2890->2887 2892 405d8a 2 API calls 2891->2892 2893 405e03 2892->2893 2893->2879 2894 402198 LoadLibraryA 2895 40669a 2896 405e6b 2 API calls 2895->2896 2897 4066a2 2896->2897 2898 405e27 2 API calls 2897->2898 2899 4066cd 2898->2899 2900 405e27 2 API calls 2899->2900 2901 4066f4 2900->2901 2902 40799c ??3@YAXPAX 2758 4056dd calloc 2792 40135e 2793 40137a ctype 6 API calls 2792->2793 2794 401366 2793->2794 2795 401374 2794->2795 2796 40136d ??3@YAXPAX 2794->2796 2796->2795 2797 4041de 2798 4041e4 2797->2798 2799 403bd6 2 API calls 2798->2799 2800 4041fb 2799->2800 2801 403bd6 2 API calls 2800->2801 2802 40427f 2801->2802 2903 40621e 2904 405e6b 2 API calls 2903->2904 2905 406226 2904->2905 2906 405e27 2 API calls 2905->2906 2907 406250 2906->2907 2908 405e27 2 API calls 2907->2908 2909 406264 2908->2909 2910 405e27 2 API calls 2909->2910 2911 406278 2910->2911 2912 405e27 2 API calls 2911->2912 2913 40628c 2912->2913 2914 405e6b 2 API calls 2913->2914 2915 4062a0 2914->2915 2916 405e6b 2 API calls 2915->2916 2917 4062c0 2916->2917 2918 405e6b 2 API calls 2917->2918 2919 4062d5 2918->2919 2920 405e6b 2 API calls 2919->2920 2921 4062e9 2920->2921 2922 405e27 2 API calls 2921->2922 2923 4062fd 2922->2923 2924 405e27 2 API calls 2923->2924 2925 406311 2924->2925 2926 405e27 2 API calls 2925->2926 2927 406325 2926->2927 2928 405e27 2 API calls 2927->2928 2929 406339 2928->2929 2930 405e27 2 API calls 2929->2930 2931 40634d 2930->2931 2932 405e6b 2 API calls 2931->2932 2933 406361 2932->2933 2934 405e6b 2 API calls 2933->2934 2939 406375 2934->2939 2935 406486 2936 40641e 2936->2935 2941 406464 2936->2941 2942 405d0e SetFilePointer 2936->2942 2937 4063f6 2937->2936 2944 405d8a 2 API calls 2937->2944 2938 4063be 2938->2936 2938->2937 2940 405d0e SetFilePointer 2938->2940 2939->2936 2939->2938 2943 405d8a 2 API calls 2939->2943 2940->2937 2941->2935 2945 405d8a 2 API calls 2941->2945 2942->2941 2943->2938 2944->2936 2945->2935 2803 4016e1 2804 4016f6 2803->2804 2805 4016ea CloseHandle 2803->2805 2805->2804 2946 4021a3 GetProcAddress 2947 406d26 2948 406d39 2947->2948 2949 405d0e SetFilePointer 2948->2949 2970 406d40 2948->2970 2950 406d57 2949->2950 2951 406d5e ??2@YAPAXI 2950->2951 2950->2970 2952 405d8a 2 API calls 2951->2952 2953 406d78 2952->2953 2954 406d80 ??3@YAXPAX 2953->2954 2955 406d93 strcpy 2953->2955 2954->2970 2956 406dbe _mbsstr 2955->2956 2958 406de7 _mbsstr 2956->2958 2958->2956 2959 406df5 _mbsstr 2958->2959 2959->2956 2960 406e03 _mbsstr 2959->2960 2960->2956 2961 406e16 strcpy 2960->2961 2962 406e48 2961->2962 2971 406b23 SystemTimeToFileTime 2962->2971 2964 406ee5 LocalFileTimeToFileTime 2965 406f32 strcmp 2964->2965 2968 406f6e 2964->2968 2965->2968 2969 406f5f 2965->2969 2966 407042 memcpy 2966->2970 2967 40703b ??3@YAXPAX 2967->2966 2968->2966 2968->2967 2969->2965 2969->2968 2971->2964 2662 401e67 GetFileAttributesA 2663 401e41 2662->2663 2664 401e8f 2663->2664 2666 401e4f strcmp 2663->2666 2668 407656 2664->2668 2666->2662 2666->2663 2667 401e95 2669 407666 2668->2669 2670 40765f 2668->2670 2669->2670 2676 40747b 2669->2676 2670->2667 2672 407699 ??3@YAXPAX 2672->2667 2677 407484 2676->2677 2678 40748b 2676->2678 2687 406a97 2677->2687 2680 40749c 2678->2680 2693 406162 2678->2693 2680->2672 2682 407572 2680->2682 2683 407586 ??3@YAXPAX 2682->2683 2684 40758d 2682->2684 2683->2684 2685 4075a0 ??3@YAXPAX 2684->2685 2686 4075a7 ??3@YAXPAX 2684->2686 2685->2686 2686->2672 2688 406ab0 2687->2688 2689 406aa9 2687->2689 2688->2678 2689->2688 2690 406ad7 free 2689->2690 2692 406add 2689->2692 2690->2692 2691 406aee free 2691->2688 2692->2691 2694 406170 2693->2694 2695 40616b 2693->2695 2696 40617c 2694->2696 2697 406a97 2 API calls 2694->2697 2695->2680 2700 405c9f 2696->2700 2697->2696 2699 406184 free 2699->2680 2701 405ca8 2700->2701 2702 405cad 2700->2702 2701->2699 2703 405cb3 CloseHandle 2702->2703 2704 405cbc ??3@YAXPAX 2702->2704 2703->2704 2704->2699 2972 4075ad 2975 4074a4 2972->2975 2988 4076c8 2975->2988 2977 4074ae ??2@YAPAXI 2978 4074d0 2977->2978 2979 4074c8 2977->2979 2992 406b8e 2978->2992 2989 407527 2979->2989 2983 4074f3 2985 407505 2983->2985 2986 407572 2 API calls 2983->2986 2984 407509 ??2@YAPAXI 2984->2985 2987 4074fe ??3@YAXPAX 2986->2987 2987->2985 2988->2977 2990 40756b 2989->2990 2991 40754e strlen ??2@YAPAXI strcpy 2989->2991 2990->2978 2991->2990 2993 406b9e 2992->2993 2995 406bf9 2992->2995 2994 406ba8 GetCurrentDirectoryA strlen 2993->2994 2993->2995 2996 406bcd 2994->2996 2997 406bde 2994->2997 2995->2983 2995->2984 2996->2997 2998 406bd1 strcat 2996->2998 2999 406c00 2997->2999 3000 406be5 SetFilePointer 2997->3000 2998->2997 3004 405bae 2999->3004 3000->2995 3000->2999 3005 405bbd 3004->3005 3006 405c18 SetFilePointer 3005->3006 3007 405bc7 3005->3007 3008 405c36 ??2@YAPAXI 3005->3008 3009 405beb CreateFileA 3005->3009 3006->3008 3007->2995 3013 405fe2 3007->3013 3011 405c46 3008->3011 3009->3006 3009->3007 3011->3007 3012 405c85 SetFilePointer 3011->3012 3012->3007 3014 405ff9 3013->3014 3038 406118 3013->3038 3015 406112 3014->3015 3039 405edf 3014->3039 3016 405c9f 2 API calls 3015->3016 3016->3038 3019 405d0e SetFilePointer 3020 406026 3019->3020 3021 405e6b 2 API calls 3020->3021 3022 40603a 3021->3022 3023 405e27 2 API calls 3022->3023 3024 40604d 3023->3024 3025 405e27 2 API calls 3024->3025 3026 406060 3025->3026 3027 405e27 2 API calls 3026->3027 3028 406076 3027->3028 3029 405e27 2 API calls 3028->3029 3030 406089 3029->3030 3031 405e6b 2 API calls 3030->3031 3032 4060ba 3031->3032 3033 405e6b 2 API calls 3032->3033 3034 4060cd 3033->3034 3035 405e27 2 API calls 3034->3035 3036 4060e3 3035->3036 3036->3015 3037 40611d malloc 3036->3037 3037->3038 3038->2995 3040 405d0e SetFilePointer 3039->3040 3041 405ef3 3040->3041 3042 405f2a 3041->3042 3051 405cdd 3041->3051 3042->3019 3044 405f02 malloc 3044->3042 3050 405f32 3044->3050 3046 405fd3 free 3046->3042 3047 405d0e SetFilePointer 3047->3050 3048 405fd2 3048->3046 3049 405d8a 2 API calls 3049->3050 3050->3046 3050->3047 3050->3048 3050->3049 3052 405d01 3051->3052 3053 405cea 3051->3053 3052->3044 3053->3052 3054 405cef SetFilePointer 3053->3054 3054->3044 2759 4056ee free 2806 40216e VirtualAlloc 2807 406c6f 2808 406a97 2 API calls 2807->2808 2809 406c75 2808->2809 2810 406c85 memcpy 2809->2810 2811 406ca2 2809->2811 2810->2811 2812 4043f0 2817 4043f2 2812->2817 2813 403bd6 2 API calls 2821 4049ec 2813->2821 2814 4049c2 2814->2813 2815 4045f6 memcpy 2815->2817 2816 403bd6 2 API calls 2816->2817 2817->2814 2817->2815 2817->2816 2818 403cfc 2 API calls 2817->2818 2819 404a94 2817->2819 2822 404b44 2817->2822 2818->2817 2820 403bd6 2 API calls 2819->2820 2820->2821 2823 403bd6 2 API calls 2822->2823 2823->2814 3055 4019b1 3056 4019c0 3055->3056 3057 4019b7 GlobalFree 3055->3057 3058 4019c6 CloseHandle 3056->3058 3059 4019cf 3056->3059 3057->3056 3058->3059 2308 407572 2309 407586 ??3@YAXPAX 2308->2309 2310 40758d 2308->2310 2309->2310 2311 4075a0 ??3@YAXPAX 2310->2311 2312 4075a7 2310->2312 2311->2312 3060 4021b2 FreeLibrary 3061 4071b2 3062 406880 3 API calls 3061->3062 3063 4071c8 3062->3063 3064 406a97 2 API calls 3063->3064 3065 4071d8 3063->3065 3064->3065 3066 4014b3 CreateFileA 3067 4016d0 _local_unwind2 3066->3067 3068 401524 GetFileSizeEx 3066->3068 3070 4016f9 3067->3070 3068->3067 3069 401538 3068->3069 3069->3067 3071 401547 ReadFile 3069->3071 3071->3067 3072 401564 memcmp 3071->3072 3072->3067 3073 401582 ReadFile 3072->3073 3073->3067 3074 40159f 3073->3074 3074->3067 3075 4015b0 ReadFile 3074->3075 3075->3067 3076 4015cb ReadFile 3075->3076 3076->3067 3077 4015e8 ReadFile 3076->3077 3077->3067 3078 401605 3077->3078 3078->3067 3079 4019e1 5 API calls 3078->3079 3080 401642 3079->3080 3080->3067 3081 402a76 8 API calls 3080->3081 3082 401666 GlobalAlloc 3081->3082 3082->3067 3083 40167a ReadFile 3082->3083 3083->3067 3084 401698 3083->3084 3084->3067 3085 403a77 18 API calls 3084->3085 3086 4016c5 3085->3086 3086->3067 2824 407178 2825 406a97 2 API calls 2824->2825 2826 40715e 2825->2826 2827 4017ff 2832 40181b DeleteCriticalSection 2827->2832 2829 401807 2830 401815 2829->2830 2831 40180e ??3@YAXPAX 2829->2831 2831->2830 2832->2829

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 44 4014a6-40151e CreateFileA 45 4016d0-401707 _local_unwind2 44->45 46 401524-401532 GetFileSizeEx 44->46 46->45 47 401538 46->47 49 401547-40155e ReadFile 47->49 50 40153a-401541 47->50 49->45 51 401564-40157c memcmp 49->51 50->45 50->49 51->45 52 401582-401599 ReadFile 51->52 52->45 53 40159f-4015aa 52->53 53->45 54 4015b0-4015c5 ReadFile 53->54 54->45 55 4015cb-4015e2 ReadFile 54->55 55->45 56 4015e8-4015ff ReadFile 55->56 56->45 57 401605-40160b 56->57 57->45 58 401611 57->58 59 401623-401644 call 4019e1 58->59 60 401613-40161d 58->60 59->45 63 40164a-401678 call 402a76 GlobalAlloc 59->63 60->45 60->59 63->45 66 40167a-401696 ReadFile 63->66 66->45 67 401698-40169d 66->67 67->45 68 40169f-4016a5 67->68 69 4016b1-4016ce call 403a77 68->69 70 4016a7 68->70 69->45 70->45 71 4016a9-4016af 70->71 71->45 71->69
                                        APIs
                                        • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                        • ReadFile.KERNEL32(00000000,?,00000008,?,00000000), ref: 00401556
                                        • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                        • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 00401591
                                        • ReadFile.KERNEL32(00000000,?,00000100,?,00000000), ref: 004015BD
                                        • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 004015DA
                                        • ReadFile.KERNEL32(00000000,?,00000008,?,00000000), ref: 004015F7
                                        • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                        • ReadFile.KERNEL32(000000FF,?,?,?,00000000), ref: 0040168E
                                        • _local_unwind2.MSVCRT ref: 004016D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Read$AllocCreateGlobalSize_local_unwind2memcmp
                                        • String ID: 2!@$WANACRY!
                                        • API String ID: 1982583507-2846199637
                                        • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                        • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                        • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                        • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 74 4014b3-40151e CreateFileA 75 4016d0-401707 _local_unwind2 74->75 76 401524-401532 GetFileSizeEx 74->76 76->75 77 401538 76->77 79 401547-40155e ReadFile 77->79 80 40153a-401541 77->80 79->75 81 401564-40157c memcmp 79->81 80->75 80->79 81->75 82 401582-401599 ReadFile 81->82 82->75 83 40159f-4015aa 82->83 83->75 84 4015b0-4015c5 ReadFile 83->84 84->75 85 4015cb-4015e2 ReadFile 84->85 85->75 86 4015e8-4015ff ReadFile 85->86 86->75 87 401605-40160b 86->87 87->75 88 401611 87->88 89 401623-401644 call 4019e1 88->89 90 401613-40161d 88->90 89->75 93 40164a-401678 call 402a76 GlobalAlloc 89->93 90->75 90->89 93->75 96 40167a-401696 ReadFile 93->96 96->75 97 401698-40169d 96->97 97->75 98 40169f-4016a5 97->98 99 4016b1-4016ce call 403a77 98->99 100 4016a7 98->100 99->75 100->75 101 4016a9-4016af 100->101 101->75 101->99
                                        APIs
                                        • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                        • ReadFile.KERNEL32(00000000,?,00000008,?,00000000), ref: 00401556
                                        • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                        • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 00401591
                                        • ReadFile.KERNEL32(00000000,?,00000100,?,00000000), ref: 004015BD
                                        • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 004015DA
                                        • ReadFile.KERNEL32(00000000,?,00000008,?,00000000), ref: 004015F7
                                        • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                        • ReadFile.KERNEL32(000000FF,?,?,?,00000000), ref: 0040168E
                                        • _local_unwind2.MSVCRT ref: 004016D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Read$AllocCreateGlobalSize_local_unwind2memcmp
                                        • String ID: 2!@$WANACRY!
                                        • API String ID: 1982583507-2846199637
                                        • Opcode ID: 0617473e4e20d7b6ed9bef36bf15e82b9b6eff7b6dc2b454fe684dd7f5303500
                                        • Instruction ID: 4f5db7b03fbae4bd1a74ba09c9783dfc14942441ffc150fb06ee42d3f2d97cbc
                                        • Opcode Fuzzy Hash: 0617473e4e20d7b6ed9bef36bf15e82b9b6eff7b6dc2b454fe684dd7f5303500
                                        • Instruction Fuzzy Hash: EF511C71901219AFDB219F95CD88BEEB7BCEB08380F1444BAF515F61A0D7399A45CF28

                                        Control-flow Graph

                                        APIs
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                        • OpenServiceA.ADVAPI32(00000000,dsvqhifq359,000F01FF), ref: 00401D21
                                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                        • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                        • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandleOpen$ManagerStart
                                        • String ID: cmd.exe /c "%s"$dsvqhifq359
                                        • API String ID: 1485051382-2525565682
                                        • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                        • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                        • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                        • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                        APIs
                                          • Part of subcall function 0040182C: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,?,00401869,?,00401448,?), ref: 00401849
                                        • CryptImportKey.ADVAPI32(?,0040EBF8,00000494,00000000,00000000,?,?,00401448,?), ref: 00401888
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$AcquireContextImport
                                        • String ID:
                                        • API String ID: 193843291-0
                                        • Opcode ID: 00163cd05f23b90a1eb4289055b6149a937518a9f4e0d8f5a43f95d4d64a5ccf
                                        • Instruction ID: dd5a952b134a24afde2d3cacf3910d543f64e1b6cba6ed960c047e302ab63d3a
                                        • Opcode Fuzzy Hash: 00163cd05f23b90a1eb4289055b6149a937518a9f4e0d8f5a43f95d4d64a5ccf
                                        • Instruction Fuzzy Hash: 15F08C73504202AAF6247621DC42E7772ACAF10348B00C83BF946F05F0E779EA919659
                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,?,00401869,?,00401448,?), ref: 00401849
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AcquireContextCrypt
                                        • String ID:
                                        • API String ID: 3951991833-0
                                        • Opcode ID: 05a3c7366586a31bd645e4b87497eee4fc7f9b0be6c205703f8acccdb6d36970
                                        • Instruction ID: a10c3aed07c23a8bf5b408c060acb1fa1e0ef34e360896137e0dfc64bb6721bb
                                        • Opcode Fuzzy Hash: 05a3c7366586a31bd645e4b87497eee4fc7f9b0be6c205703f8acccdb6d36970
                                        • Instruction Fuzzy Hash: 1EE0C23734011064F330242AAC05FE71559D7C1714F14C036F906EA0D0C2248A4780A8

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000208), ref: 0040201F
                                          • Part of subcall function 00401225: GetComputerNameW.KERNEL32(?,0000018F), ref: 0040125F
                                          • Part of subcall function 00401225: wcslen.MSVCRT ref: 00401279
                                          • Part of subcall function 00401225: wcslen.MSVCRT ref: 00401298
                                          • Part of subcall function 00401225: srand.MSVCRT ref: 004012A1
                                          • Part of subcall function 00401225: rand.MSVCRT ref: 004012AE
                                          • Part of subcall function 00401225: rand.MSVCRT ref: 004012C0
                                          • Part of subcall function 00401225: rand.MSVCRT ref: 004012DD
                                        • __p___argc.MSVCRT ref: 00402030
                                        • __p___argv.MSVCRT ref: 00402040
                                        • strcmp.MSVCRT ref: 0040204B
                                          • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,dsvqhifq359,000000FF,?,00000063), ref: 00401BCA
                                          • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                          • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                          • Part of subcall function 00401B5F: GetFileAttributesW.KERNELBASE(?), ref: 00401C10
                                        • CopyFileA.KERNEL32(?,tasksche.exe,00000000), ref: 0040206F
                                        • GetFileAttributesA.KERNELBASE(tasksche.exe), ref: 00402076
                                          • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                        • strrchr.MSVCRT ref: 0040209D
                                        • strrchr.MSVCRT ref: 004020AE
                                        • SetCurrentDirectoryA.KERNELBASE(?), ref: 004020BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Namerand$AttributesDirectorystrrchrwcslen$ByteCharComputerCopyCurrentFullModuleMultiPathWideWindows__p___argc__p___argvsrandstrcmpswprintf
                                        • String ID: TaskStart$attrib +h .$dsvqhifq359$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                        • API String ID: 1102508541-3280366790
                                        • Opcode ID: 2ff1392d6f58b437ec25317e3d0be93fd1ee27ac7dc1296052efe3cc6886503f
                                        • Instruction ID: 97633fc0405850e3ba211803acf8e340ff081048f6dba40907e2b9e4b27fb4f3
                                        • Opcode Fuzzy Hash: 2ff1392d6f58b437ec25317e3d0be93fd1ee27ac7dc1296052efe3cc6886503f
                                        • Instruction Fuzzy Hash: 3741B472500359AEDB20A7B1DE49E9F376C9F10314F2005BFF645F61E2DE788D488A28

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 104 40714c-40714f 105 407210-407214 104->105 106 407155-407158 104->106 108 407216-40721d call 406a97 105->108 109 40721e-40722a 105->109 106->105 107 40715e-407163 106->107 110 407474-407478 107->110 108->109 109->107 112 407230-407233 109->112 114 407235-407236 call 4064e2 112->114 115 40723c-407241 112->115 119 40723b 114->119 117 407243-407249 call 406520 115->117 118 40724b-407261 call 406c40 115->118 117->119 124 407263-407266 118->124 125 40729c-40729f 118->125 119->115 128 4071e3-4071e5 124->128 129 40726c-407273 124->129 126 4072a1-4072a4 125->126 127 4072a9-4072b0 125->127 130 407331-407337 126->130 131 4072b2-4072b4 127->131 128->110 132 407283-407286 129->132 133 407275-407277 129->133 134 407339-40733e 130->134 135 4073ab-4073c6 call 40671d 130->135 136 4072b6-4072b8 131->136 137 4072c7-4072d8 strcpy 131->137 139 407290-407297 call 407070 132->139 133->132 138 407279-40727b 133->138 134->110 156 4073d5 135->156 157 4073c8-4073cf ??2@YAPAXI@Z 135->157 141 4072ba-4072bc 136->141 142 4072be 136->142 144 407343-407356 137->144 145 4072da 137->145 146 407288-40728f 138->146 147 40727d-407281 138->147 139->128 141->142 151 4072c1-4072c5 141->151 142->151 149 407358-40735f 144->149 150 40737b-4073a6 wsprintfA call 407070 144->150 153 4072e1-40730a wsprintfA call 407070 145->153 146->139 147->132 147->146 149->150 154 407361-407368 149->154 164 407312-40732b CreateFileA 150->164 151->131 162 40730f 153->162 154->153 159 40736e-407375 154->159 161 4073d9-4073f3 call 406880 156->161 157->156 159->150 159->153 166 407421-407428 161->166 167 4073f5-4073f7 161->167 162->164 164->130 170 40745a-40745e 166->170 168 4073f9 167->168 169 40742a-407431 167->169 171 407415-407419 168->171 172 4073fb-407413 WriteFile 168->172 169->170 173 407460-407463 CloseHandle 170->173 174 407469-407473 call 406a97 170->174 176 40741b-40741d 171->176 177 40743c-407454 SetFileTime 171->177 172->171 175 407433-40743a 172->175 173->174 174->110 175->170 176->169 180 40741f 176->180 177->170 180->161
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s$%s%s%s$:$\
                                        • API String ID: 0-1100577047
                                        • Opcode ID: 7af23acfb13c3847202d0f3544f069c8b3606865e2b11a7f6c25b24928257d8c
                                        • Instruction ID: dec7791a7ad8f487ce6c0967fc7a8847d7a3d4ba063244555504d9e5938931ce
                                        • Opcode Fuzzy Hash: 7af23acfb13c3847202d0f3544f069c8b3606865e2b11a7f6c25b24928257d8c
                                        • Instruction Fuzzy Hash: 86710671D0C2089ADB219F14CC44BEA7BA9AB01304F1445BFF885B62D1D779BA86CB5A

                                        Control-flow Graph

                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,dsvqhifq359,000000FF,?,00000063), ref: 00401BCA
                                        • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                        • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                        • GetFileAttributesW.KERNELBASE(?), ref: 00401C10
                                        • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                        • wcsrchr.MSVCRT ref: 00401CAC
                                        • wcsrchr.MSVCRT ref: 00401CBD
                                          • Part of subcall function 00401AF6: CreateDirectoryW.KERNELBASE(?,00000000), ref: 00401B07
                                          • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNELBASE(?), ref: 00401B12
                                          • Part of subcall function 00401AF6: CreateDirectoryW.KERNELBASE(?,00000000), ref: 00401B1E
                                          • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNELBASE(?), ref: 00401B21
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                        • String ID: %s\Intel$%s\ProgramData$dsvqhifq359
                                        • API String ID: 3806094219-2329595571
                                        • Opcode ID: 82f37d28a7ec1077cf8751c63b0340feb8606763232324736a07dd36ddf2b000
                                        • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                        • Opcode Fuzzy Hash: 82f37d28a7ec1077cf8751c63b0340feb8606763232324736a07dd36ddf2b000
                                        • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 198 4010fd-401157 wcscat 199 40115c-40116c 198->199 200 401175 199->200 201 40116e-401173 199->201 202 40117a-401183 RegCreateKeyW 200->202 201->202 203 401189-40118c 202->203 204 40120d-401214 202->204 205 4011cc-4011f1 RegQueryValueExA 203->205 206 40118e-4011ca GetCurrentDirectoryA strlen RegSetValueExA 203->206 204->199 207 40121a 204->207 208 401200-40120b RegCloseKey 205->208 209 4011f3-4011fa SetCurrentDirectoryA 205->209 206->208 210 40121c-40121f 207->210 208->204 211 401220-401223 208->211 209->208 211->210
                                        APIs
                                        • wcscat.MSVCRT ref: 0040114B
                                        • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                        • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                        • strlen.MSVCRT ref: 004011A7
                                        • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                        • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                        • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                        • String ID: 0@$Software\$WanaCrypt0r
                                        • API String ID: 865909632-3421300005
                                        • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                        • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                        • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                        • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 221 4077c7-40782f __set_app_type __p__fmode __p__commode call 40793f 224 407831-40783c __setusermatherr 221->224 225 40783d-407894 call 40792a _initterm __getmainargs _initterm 221->225 224->225 228 4078d0-4078d3 225->228 229 407896-40789e 225->229 230 4078d5-4078d9 228->230 231 4078ad-4078b1 228->231 232 4078a0-4078a2 229->232 233 4078a4-4078a7 229->233 230->228 235 4078b3-4078b5 231->235 236 4078b7-4078c8 GetStartupInfoA 231->236 232->229 232->233 233->231 234 4078a9-4078aa 233->234 234->231 235->234 235->236 237 4078ca-4078ce 236->237 238 4078db-4078dd 236->238 239 4078de-40790b GetModuleHandleA call 401fe7 exit _XcptFilter 237->239 238->239
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                        • String ID:
                                        • API String ID: 801014965-0
                                        • Opcode ID: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                        • Instruction ID: b6807de3fe1c3e28ab0f2b8c021909998ac3013dced3884fb388c7f537fcd598
                                        • Opcode Fuzzy Hash: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                        • Instruction Fuzzy Hash: A34173B1C04344AFDB20AFA4DE49AA97BB8BF05310F20417FE581B72E1D7786845CB59

                                        Control-flow Graph

                                        APIs
                                        • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00401B07
                                        • SetCurrentDirectoryW.KERNELBASE(?), ref: 00401B12
                                        • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00401B1E
                                        • SetCurrentDirectoryW.KERNELBASE(?), ref: 00401B21
                                        • GetFileAttributesW.KERNELBASE(?), ref: 00401B2C
                                        • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00401B36
                                        • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                        • String ID: %s\%s
                                        • API String ID: 1036847564-4073750446
                                        • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                        • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                        • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                        • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 249 401064-4010b0 CreateProcessA 250 4010b2-4010b5 249->250 251 4010f7 249->251 252 4010e3-4010f5 CloseHandle * 2 250->252 253 4010b7-4010c5 WaitForSingleObject 250->253 254 4010f9-4010fc 251->254 252->254 255 4010d2-4010d5 253->255 256 4010c7-4010cc TerminateProcess 253->256 255->252 257 4010d7-4010dd GetExitCodeProcess 255->257 256->255 257->252
                                        APIs
                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                        • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                        • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                        • CloseHandle.KERNEL32(?), ref: 004010EC
                                        • CloseHandle.KERNEL32(?), ref: 004010F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                        • String ID: D
                                        • API String ID: 786732093-2746444292
                                        • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                        • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                        • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                        • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 258 401225-40127e GetComputerNameW wcslen 259 4012a0-4012be srand rand 258->259 260 401280 258->260 262 4012c0-4012d4 rand 259->262 263 4012d6 259->263 261 401286-40129e wcslen 260->261 261->259 261->261 262->262 262->263 264 4012d9-4012db 263->264 265 4012f1-4012fc 264->265 266 4012dd-4012ef rand 264->266 266->264
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: rand$wcslen$ComputerNamesrand
                                        • String ID:
                                        • API String ID: 3058258771-0
                                        • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                        • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                        • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                        • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 267 407070-407080 268 407082-40708c GetFileAttributesA 267->268 269 407097-40709e 267->269 268->269 270 40708e-407091 CreateDirectoryA 268->270 271 407132-407135 269->271 272 4070a4-4070a7 269->272 270->269 273 4070a9-4070ab 272->273 274 4070b1 273->274 275 4070ad-4070af 273->275 276 4070b3-4070b9 274->276 275->274 275->276 276->273 277 4070bb-4070bd 276->277 278 4070e7-4070f1 277->278 279 4070bf-4070df memcpy call 407070 277->279 281 407102-407121 strcat GetFileAttributesA 278->281 282 4070f3-407101 strcpy 278->282 283 4070e4 279->283 281->271 284 407123-40712c CreateDirectoryA 281->284 282->281 283->278 284->271
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(?), ref: 00407083
                                        • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                        • memcpy.MSVCRT(?,?,?), ref: 004070CA
                                        • strcpy.MSVCRT(00000000,?), ref: 004070FB
                                        • strcat.MSVCRT(00000000,?), ref: 0040710A
                                        • GetFileAttributesA.KERNELBASE(00000000), ref: 00407118
                                        • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 0040712C
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                        • String ID:
                                        • API String ID: 2935503933-0
                                        • Opcode ID: ec2dd8a6a6d018b3cd610cad55174b7a39c77c45f8e06270025fb69be962d290
                                        • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                        • Opcode Fuzzy Hash: ec2dd8a6a6d018b3cd610cad55174b7a39c77c45f8e06270025fb69be962d290
                                        • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 285 401eff-401f24 sprintf 286 401f26-401f39 OpenMutexA 285->286 287 401f4c 285->287 288 401f51-401f5b CloseHandle 286->288 289 401f3b-401f4a Sleep 286->289 290 401f4e-401f50 287->290 288->290 289->286 289->287
                                        APIs
                                        • sprintf.MSVCRT ref: 00401F16
                                        • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                        • Sleep.KERNELBASE(000003E8), ref: 00401F40
                                        • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandleMutexOpenSleepsprintf
                                        • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                        • API String ID: 2780352083-2959021817
                                        • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                        • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                        • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                        • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 291 401000-401008 292 401011 291->292 293 40100a-40100f 291->293 294 401016-401027 fopen 292->294 293->294 295 401029-40102b 294->295 296 40102d-40103d 294->296 297 401061-401063 295->297 298 401047 fwrite 296->298 299 40103f-401045 fread 296->299 300 40104d-401052 298->300 299->300 301 401054-401056 300->301 302 401057-40105f fclose 300->302 301->302 302->297
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: fclosefopenfreadfwrite
                                        • String ID: c.wnry
                                        • API String ID: 4000964834-3240288721
                                        • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                        • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                        • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                        • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 303 401e67-401e77 GetFileAttributesA 304 401e79-401e87 call 40763d 303->304 305 401e8a-401e8d 303->305 304->305 307 401e41-401e65 call 4075c4 strcmp 305->307 308 401e8f-401e9d call 407656 305->308 307->303 307->304
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(?), ref: 00401E6E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID: PWVuW$PX$c.wnry
                                        • API String ID: 3188754299-2001399172
                                        • Opcode ID: ec73f6b3c9132d7e3ce96bf0fbf9a1f131312635740bf2e065ed47a29311a57c
                                        • Instruction ID: 1ab428f28edc1f41aae3b1c0182739b4a88dd02c55c662672f6f3eeec65b2962
                                        • Opcode Fuzzy Hash: ec73f6b3c9132d7e3ce96bf0fbf9a1f131312635740bf2e065ed47a29311a57c
                                        • Instruction Fuzzy Hash: 16F08272D0101429DA20A665DC45EDF336C9B85338F1004B7F945F10C1EB39EAD58AA9
                                        APIs
                                        • GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                          • Part of subcall function 00401CE8: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                          • Part of subcall function 00401EFF: sprintf.MSVCRT ref: 00401F16
                                          • Part of subcall function 00401EFF: OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                          • Part of subcall function 00401EFF: Sleep.KERNELBASE(000003E8), ref: 00401F40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Open$FullManagerMutexNamePathSleepsprintf
                                        • String ID: tasksche.exe
                                        • API String ID: 167337186-4155512336
                                        • Opcode ID: e28efb750bf976631a794869ff46538edd4b3e3d85bdc5ef0a4500b41de16267
                                        • Instruction ID: 32b044e02b32a453714f0bad96ed570d6c8ae3fbdab621874b5fd1cc0105bf25
                                        • Opcode Fuzzy Hash: e28efb750bf976631a794869ff46538edd4b3e3d85bdc5ef0a4500b41de16267
                                        • Instruction Fuzzy Hash: B101F93274430965FF6056B5ED0AF9B73AC5B00704F0005B7FA94F51E2EEB4D6858768
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,004074FE,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000), ref: 00407587
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,004074FE,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000), ref: 004075A1
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??3@
                                        • String ID:
                                        • API String ID: 613200358-0
                                        • Opcode ID: ba5292d95df2e6e8fe9c6fc3959bdbdfb5d84876b251159bb7c94f9be4a473a2
                                        • Instruction ID: 0625bedb389590e33774cd0b9b2d0ee1860b9ef3adb0428d6309db58d756d510
                                        • Opcode Fuzzy Hash: ba5292d95df2e6e8fe9c6fc3959bdbdfb5d84876b251159bb7c94f9be4a473a2
                                        • Instruction Fuzzy Hash: ADE04F32B0460367DA145A2AE801BD6F3ACAF40325F10092EA444F3180CB3CBA81C6A8
                                        APIs
                                          • Part of subcall function 00401861: CryptImportKey.ADVAPI32(?,0040EBF8,00000494,00000000,00000000,?,?,00401448,?), ref: 00401888
                                        • GlobalAlloc.KERNELBASE(00000000,00100000,?), ref: 0040146A
                                        • GlobalAlloc.KERNELBASE(00000000,00100000), ref: 00401479
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocGlobal$CryptImport
                                        • String ID:
                                        • API String ID: 2229914853-0
                                        • Opcode ID: f1c38862a4e40a926a9cb8dbd32efdc124995eee8a134f66152ea3beb40ebdb5
                                        • Instruction ID: 13949ebcdeb320815bc01409d0816805a193b4ce3528f2eda1310b41e89de721
                                        • Opcode Fuzzy Hash: f1c38862a4e40a926a9cb8dbd32efdc124995eee8a134f66152ea3beb40ebdb5
                                        • Instruction Fuzzy Hash: E9F01DB25047059EE360DA259C40F57B3E8EFC4794F10493FE959E22A1E774A8058B25
                                        APIs
                                          • Part of subcall function 004018B9: CryptDestroyKey.ADVAPI32(?,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018C4
                                          • Part of subcall function 004018B9: CryptDestroyKey.ADVAPI32(?,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018D6
                                          • Part of subcall function 004018B9: CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                        • GlobalFree.KERNELBASE(?), ref: 00401407
                                        • GlobalFree.KERNELBASE(?), ref: 00401427
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$DestroyFreeGlobal$ContextRelease
                                        • String ID:
                                        • API String ID: 3802593847-0
                                        • Opcode ID: 6a6a0ddf2cc44157899aa89d4246a2e7fd4c82d45ff6ecee45ca955221c1c337
                                        • Instruction ID: afe9474b1f6453f597e9dfd6c6faa5702c9a72b75f6a7d499fb8a404dd574701
                                        • Opcode Fuzzy Hash: 6a6a0ddf2cc44157899aa89d4246a2e7fd4c82d45ff6ecee45ca955221c1c337
                                        • Instruction Fuzzy Hash: 25F04FB12026004EF761D625D8C4FA373D4EB50319F14443EE59E972F1CA78AC458B28
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: calloc
                                        • String ID:
                                        • API String ID: 2635317215-0
                                        • Opcode ID: c79bc297218a7ee9d4f5a5f90e12914113c8194a3ce27a4038e9e9559bc3c912
                                        • Instruction ID: e97520f53d479ee56607858e69e3bcf2bfd840abb73b8ebea511af8bedfd3791
                                        • Opcode Fuzzy Hash: c79bc297218a7ee9d4f5a5f90e12914113c8194a3ce27a4038e9e9559bc3c912
                                        • Instruction Fuzzy Hash: A2B0123200C200FFCF050B00FD05409BBA1EF84231F30C41DF096000708F324020AB05
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 4703dff8ab147e29624c9a464740c36ea3abe7ebfc27b417c2f57159497d317e
                                        • Instruction ID: c0edcc233990ff9cdbf4b79c666f34576f6bab842d07e662915ac3b582d0cfa1
                                        • Opcode Fuzzy Hash: 4703dff8ab147e29624c9a464740c36ea3abe7ebfc27b417c2f57159497d317e
                                        • Instruction Fuzzy Hash: 67A00271005501DBCA451B20EF0C8497F71EF84252B60456DF08754470CF324462AA09
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??2@??3@
                                        • String ID: /../$/..\$\../$\..\
                                        • API String ID: 1936579350-3885502717
                                        • Opcode ID: 9fe2ee11d69112ebdb782c6af2ace678ca2e36f17f4e057c812f61113bddf1f6
                                        • Instruction ID: 3737b326712c28fce93d2c19f1fd65a783408c21a39be2a04ec551ad1204ea0d
                                        • Opcode Fuzzy Hash: 9fe2ee11d69112ebdb782c6af2ace678ca2e36f17f4e057c812f61113bddf1f6
                                        • Instruction Fuzzy Hash: B6A153729082499FDB19CF68C8916EEBBF4EF05300F14857FE496A7281C738A515CB98
                                        APIs
                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                        • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 00401A77
                                        • GetProcAddress.KERNEL32(00000000,CryptImportKey), ref: 00401A84
                                        • GetProcAddress.KERNEL32(00000000,CryptDestroyKey), ref: 00401A91
                                        • GetProcAddress.KERNEL32(00000000,CryptEncrypt), ref: 00401A9E
                                        • GetProcAddress.KERNEL32(00000000,CryptDecrypt), ref: 00401AAB
                                        • GetProcAddress.KERNEL32(00000000,CryptGenKey), ref: 00401AB8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                        • API String ID: 2238633743-2459060434
                                        • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                        • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                        • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                        • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                        APIs
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(?), ref: 00402A95
                                        • _CxxThrowException.MSVCRT(00000010,0040D570), ref: 00402AA4
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(?), ref: 00402ACD
                                        • _CxxThrowException.MSVCRT(00000010,0040D570), ref: 00402ADC
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(?), ref: 00402AFF
                                        • _CxxThrowException.MSVCRT(00000010,0040D570), ref: 00402B0E
                                        • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                        • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??0exception@@ExceptionThrow$memcpy
                                        • String ID:
                                        • API String ID: 1881450474-3916222277
                                        • Opcode ID: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                        • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                        • Opcode Fuzzy Hash: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                        • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                        • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                        • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                        • CryptImportKey.ADVAPI32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,00401448,?), ref: 00401993
                                        • _local_unwind2.MSVCRT ref: 004019A6
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$AllocCreateCryptGlobalImportReadSize_local_unwind2
                                        • String ID:
                                        • API String ID: 1543066754-0
                                        • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                        • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                        • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                        • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                        APIs
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570), ref: 00403528
                                        • _CxxThrowException.MSVCRT(?,0040D570), ref: 00403537
                                        • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??0exception@@ExceptionThrowmemcpy
                                        • String ID: $Q;@
                                        • API String ID: 2382887404-262343263
                                        • Opcode ID: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                        • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                        • Opcode Fuzzy Hash: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                        • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                        • CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,?,?,?,?,00401642,?,?,?,?), ref: 00401A08
                                        • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                        • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                        • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CriticalSection$Leave$CryptDecryptEntermemcpy
                                        • String ID:
                                        • API String ID: 629328382-0
                                        • Opcode ID: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                        • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                        • Opcode Fuzzy Hash: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                        • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65
                                        APIs
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570), ref: 004037B0
                                        • _CxxThrowException.MSVCRT(?,0040D570), ref: 004037BF
                                        • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??0exception@@ExceptionThrowmemcpy
                                        • String ID:
                                        • API String ID: 2382887404-3916222277
                                        • Opcode ID: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                        • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                        • Opcode Fuzzy Hash: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                        • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                        APIs
                                        • CryptDestroyKey.ADVAPI32(?,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018C4
                                        • CryptDestroyKey.ADVAPI32(?,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018D6
                                        • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$Destroy$ContextRelease
                                        • String ID:
                                        • API String ID: 1308222791-0
                                        • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                        • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                        • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                        • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                        APIs
                                        • free.MSVCRT ref: 00402A15
                                        • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                        • HeapFree.KERNEL32(00000000), ref: 00402A3D
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$FreeProcessfree
                                        • String ID:
                                        • API String ID: 3428986607-0
                                        • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                        • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                        • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                        • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                        APIs
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570), ref: 00402E98
                                        • _CxxThrowException.MSVCRT(?,0040D570), ref: 00402EA7
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??0exception@@ExceptionThrow
                                        • String ID:
                                        • API String ID: 941485209-0
                                        • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                        • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                        • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                        • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                        APIs
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570), ref: 004031D6
                                        • _CxxThrowException.MSVCRT(?,0040D570), ref: 004031E5
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??0exception@@ExceptionThrow
                                        • String ID:
                                        • API String ID: 941485209-0
                                        • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                        • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                        • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                        • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                        APIs
                                        • memcpy.MSVCRT(?,00000004,00000008), ref: 004045FD
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: memcpy
                                        • String ID:
                                        • API String ID: 3510742995-0
                                        • Opcode ID: 3fbcc6dd2c8130b83686b16ca7a95838e28512f32bb7137642e9b42f172d5f5b
                                        • Instruction ID: be8c264385d7e176af4cd986d8d852d6530fc42194437b9fc1d08ba6d3138758
                                        • Opcode Fuzzy Hash: 3fbcc6dd2c8130b83686b16ca7a95838e28512f32bb7137642e9b42f172d5f5b
                                        • Instruction Fuzzy Hash: 83521DB1900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55DF44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: WG@
                                        • API String ID: 0-1599502709
                                        • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                        • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                        • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                        • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                        • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                        • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                        • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                        APIs
                                          • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                          • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 00401A77
                                          • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey), ref: 00401A84
                                          • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey), ref: 00401A91
                                          • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt), ref: 00401A9E
                                          • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt), ref: 00401AAB
                                          • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey), ref: 00401AB8
                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                        • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                        • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                        • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                        • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                        • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                        • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                        • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                        • API String ID: 2238633743-1294736154
                                        • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                        • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                        • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                        • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                        APIs
                                          • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?,00000040,?,76379DE0,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402463
                                        • SetLastError.KERNEL32(000000C1,?,76379DE0,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402219
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,76379DE0,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402291
                                        • GetProcessHeap.KERNEL32(00000008,0000003C), ref: 00402313
                                        • HeapAlloc.KERNEL32(00000000), ref: 0040231A
                                        • memcpy.MSVCRT(00000000,?,?), ref: 004023A7
                                          • Part of subcall function 00402470: memset.MSVCRT ref: 004024D5
                                        • SetLastError.KERNEL32(0000045A), ref: 00402430
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                        • API String ID: 1900561814-192647395
                                        • Opcode ID: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                        • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                        • Opcode Fuzzy Hash: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                        • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                        APIs
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570), ref: 00403A91
                                        • _CxxThrowException.MSVCRT(?,0040D570), ref: 00403AA0
                                        • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                        • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                        • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574), ref: 00403BC2
                                        • _CxxThrowException.MSVCRT(?,0040D570), ref: 00403BD1
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??0exception@@ExceptionThrowmemcpy
                                        • String ID:
                                        • API String ID: 2382887404-0
                                        • Opcode ID: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                        • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                        • Opcode Fuzzy Hash: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                        • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                        APIs
                                        • IsBadReadPtr.KERNEL32(00000000,00000014), ref: 00402812
                                        • realloc.MSVCRT ref: 00402854
                                        • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Read$realloc
                                        • String ID:
                                        • API String ID: 1241503663-0
                                        • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                        • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                        • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                        • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,00000140,?,00406C12,?,00000000,00000001), ref: 00405BFE
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?), ref: 00405C29
                                        • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?,?,?), ref: 00405C38
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA), ref: 00405C8A
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Pointer$??2@Create
                                        • String ID:
                                        • API String ID: 1331958074-0
                                        • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                        • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                        • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                        • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,00000140,00000000,00000000,00000000,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003), ref: 00406BB5
                                        • strlen.MSVCRT ref: 00406BBC
                                        • strcat.MSVCRT(00000140,0040F818,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000), ref: 00406BD7
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00406BEE
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectoryFilePointerstrcatstrlen
                                        • String ID:
                                        • API String ID: 1952800545-0
                                        • Opcode ID: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                        • Instruction ID: 093f70e5e45cef0a0e83344fd40667ee43cd8b667dee5f3d4d1a5a93074d9648
                                        • Opcode Fuzzy Hash: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                        • Instruction Fuzzy Hash: 06112372004218AAFB305B28DD01BAB3368EB21720F21013FF592B91D0E778A9A2975D
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 004074A9
                                        • ??2@YAPAXI@Z.MSVCRT(00000244,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074B5
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074FF
                                          • Part of subcall function 00407527: strlen.MSVCRT ref: 0040754F
                                          • Part of subcall function 00407527: ??2@YAPAXI@Z.MSVCRT(00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00407556
                                          • Part of subcall function 00407527: strcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00407563
                                        • ??2@YAPAXI@Z.MSVCRT(00000008,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040750B
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??2@$??3@H_prologstrcpystrlen
                                        • String ID:
                                        • API String ID: 1367312548-0
                                        • Opcode ID: 4998767945fd9b422902d134ec740bac80b04181f3304c7354ac1dac574c8157
                                        • Instruction ID: 24e2e141a7415e54cfde60e06bc6f84240982ef19f6b767edb42695c1fbc6ce5
                                        • Opcode Fuzzy Hash: 4998767945fd9b422902d134ec740bac80b04181f3304c7354ac1dac574c8157
                                        • Instruction Fuzzy Hash: C101D431D09111BBDB166F659C02B9E3EA0AF04764F10853FF806B76D1DB78AD00C69E
                                        APIs
                                        • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000), ref: 00405CB6
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000), ref: 00405CBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3095952976.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.3095917175.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096047581.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096096208.000000000040E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096126879.000000000040F000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000008.00000002.3096264179.0000000000410000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??3@CloseHandle
                                        • String ID: $l@
                                        • API String ID: 3816424416-2140230165
                                        • Opcode ID: f47a0d8120d18fd3d7dcf50ee501bfb2ca6f5426bcc0e1f86b14009817ab8223
                                        • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                        • Opcode Fuzzy Hash: f47a0d8120d18fd3d7dcf50ee501bfb2ca6f5426bcc0e1f86b14009817ab8223
                                        • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC