Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GeW4GzT8G8.dll

Overview

General Information

Sample name:GeW4GzT8G8.dll
renamed because original name is a hash value
Original sample name:78bd8b9c610315d7247e2076bbd9458c.dll
Analysis ID:1592021
MD5:78bd8b9c610315d7247e2076bbd9458c
SHA1:a8029cfe179dfc15c9a52ecd4ad491403dc1c1ae
SHA256:51d5805abb1d7fb68d037399193a5f1b019d23e455fe4a5b82d245a020b5b05b
Tags:dllexeuser-mentality
Infos:

Detection

Virut, Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Yara detected Virut
Yara detected Wannacry ransomware
AI detected suspicious sample
Changes memory attributes in foreign processes to executable or writable
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Creates files in the system32 config directory
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may execute only at specific dates)
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to evade debugger and weak emulator (self modifying code)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6288 cmdline: loaddll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3504 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5692 cmdline: rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 4432 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 80F63BEA8710636ED2F30EAD25E07C82)
          • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
          • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
          • svchost.exe (PID: 744 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • dllhost.exe (PID: 5628 cmdline: C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
          • fontdrvhost.exe (PID: 776 cmdline: "fontdrvhost.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F)
          • fontdrvhost.exe (PID: 784 cmdline: "fontdrvhost.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F)
          • svchost.exe (PID: 868 cmdline: C:\Windows\system32\svchost.exe -k RPCSS -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • dwm.exe (PID: 984 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
          • svchost.exe (PID: 1200 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1352 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1404 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1648 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1740 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1800 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 2012 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • rundll32.exe (PID: 5124 cmdline: rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5860 cmdline: rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 5568 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 80F63BEA8710636ED2F30EAD25E07C82)
  • mssecsvc.exe (PID: 1196 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 80F63BEA8710636ED2F30EAD25E07C82)
    • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 372 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 772 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 888 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 660 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1100 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1224 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1412 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1596 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1704 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1716 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1876 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 2020 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
GeW4GzT8G8.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    GeW4GzT8G8.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    GeW4GzT8G8.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
          00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
            0000000C.00000002.1693222311.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
                0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
                  Click to see the 159 entries
                  SourceRuleDescriptionAuthorStrings
                  17.2.mssecsvc.exe.24f28c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  17.2.mssecsvc.exe.1fc7084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  12.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                    12.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                    • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                    • 0xf4d8:$x3: tasksche.exe
                    • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                    • 0xf52c:$x5: WNcry@2ol7
                    • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                    • 0xf42c:$s3: cmd.exe /c "%s"
                    • 0x41980:$s4: msg/m_portuguese.wnry
                    • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                    • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                    • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                    12.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                    • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                    • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                    Click to see the 114 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\WINDOWS\mssecsvc.exe, ParentImage: C:\Windows\mssecsvc.exe, ParentProcessId: 4432, ParentProcessName: mssecsvc.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, ProcessId: 744, ProcessName: svchost.exe
                    Source: Process startedAuthor: vburov: Data: Command: winlogon.exe, CommandLine: winlogon.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\winlogon.exe, NewProcessName: C:\Windows\System32\winlogon.exe, OriginalFileName: C:\Windows\System32\winlogon.exe, ParentCommandLine: C:\WINDOWS\mssecsvc.exe, ParentImage: C:\Windows\mssecsvc.exe, ParentProcessId: 4432, ParentProcessName: mssecsvc.exe, ProcessCommandLine: winlogon.exe, ProcessId: 556, ProcessName: winlogon.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:25.556934+010020127301A Network Trojan was detected192.168.2.8643201.1.1.153UDP
                    2025-01-15T16:58:17.011779+010020127301A Network Trojan was detected192.168.2.8617241.1.1.153UDP
                    2025-01-15T16:59:08.402519+010020127301A Network Trojan was detected192.168.2.8634091.1.1.153UDP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080806+010020315153Misc activity104.16.166.22880192.168.2.849704TCP
                    2025-01-15T16:57:29.210203+010020315153Misc activity104.16.167.22880192.168.2.849710TCP
                    2025-01-15T16:57:29.298854+010020315153Misc activity104.16.167.22880192.168.2.849711TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:15.577268+010020242911A Network Trojan was detected192.168.2.8637611.1.1.153UDP
                    2025-01-15T16:57:28.691144+010020242911A Network Trojan was detected192.168.2.8641821.1.1.153UDP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020242981A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020242981A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020242981A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020242991A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020242991A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020242991A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020243011A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020243011A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020243011A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020243021A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020243021A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020243021A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010028033043Unknown Traffic192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010028033043Unknown Traffic192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010028033043Unknown Traffic192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:58:25.678068+010028115771A Network Trojan was detected1.1.1.153192.168.2.853292UDP
                    2025-01-15T16:58:48.953187+010028115771A Network Trojan was detected1.1.1.153192.168.2.861145UDP
                    2025-01-15T16:59:06.237534+010028115771A Network Trojan was detected1.1.1.153192.168.2.861597UDP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: GeW4GzT8G8.dllAvira: detected
                    Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
                    Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: W32/Virut.Gen
                    Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 95%
                    Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
                    Source: GeW4GzT8G8.dllReversingLabs: Detection: 94%
                    Source: GeW4GzT8G8.dllVirustotal: Detection: 75%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                    Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                    Source: GeW4GzT8G8.dllJoe Sandbox ML: detected

                    Exploits

                    barindex
                    Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                    Source: GeW4GzT8G8.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Diagnostics.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbx source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ~1.PDB @7_9)ux source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error3)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb04 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: mp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorV)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.8:64320 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.8:61724 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.8:63409 -> 1.1.1.1:53
                    Source: C:\Windows\System32\svchost.exeDomain query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:57:16 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90270f7f185d0f97-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:57:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90270fd10f070cb2-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:57:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90270fd19ef47cfc-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                    Source: unknownDNS traffic detected: query: oxuoxj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yuaame.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fofavv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: pvjita.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: aqziks.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uncjvy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uooqwj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: kqpejd.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: txsueo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eoylnw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nfieuq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ilo.brenz.pl replaycode: Server failure (2)
                    Source: unknownDNS traffic detected: query: wvonfn.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ttilzo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ryiyek.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ikebhe.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fjlfoj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hnwafy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oloroz.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vwfafe.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: itevsb.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: wiybwa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tiggay.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tcezwt.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ncyyfy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oljrbm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bnnjpj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: whmeca.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eafaww.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: njbjte.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: sgucuw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: wjaaae.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: azmakv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hycoja.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hiuznf.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ogykld.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qxvfaq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vssqzu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hsvhuy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oyewqz.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: rxtiio.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vgkebm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uulevy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bevtua.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oegiuo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: orvwjv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mhmasr.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: iyqdfh.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: pduhba.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uzgscj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: epejsq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ant.trenz.pl replaycode: Server failure (2)
                    Source: unknownDNS traffic detected: query: izgyem.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: cmyayw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: sliweo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xfqora.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: aguuxw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vixeeq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nnezan.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: akkujf.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: veokda.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eoauui.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: unclto.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: imjmns.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ttedws.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nitrjr.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: riyymn.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jutqhm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: euieic.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fsbczk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: lnwfpg.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: zjaxax.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: icvsob.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: iieiay.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qmfezv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: gyinfa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ljomqy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: wbqpcg.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: kyfjqk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nihrqy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yhnour.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: aioade.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xwowqk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: scbors.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tvmcoy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bzmigs.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: evvbut.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eahdry.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mpblhc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nfiyae.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ueohif.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jbkunk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yntfrh.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: loauaa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uuruou.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vdxuni.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: sxsxzp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: afvqcy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ofulyt.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: snjiwm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jqjyrb.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qxkaoo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fpzsfa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hrospx.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yazpuo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: izacru.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yjumyc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bitcaa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ukmeqc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mmazow.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ytvutb.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: csyyvl.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ybdvhs.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ekfpve.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uxwoff.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: chmtuj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jseegc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jidduv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dwqzxj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: efegei.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: pqrkoe.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: favteu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: rfiiyy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: rtkhyx.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: shooys.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ielyae.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nthzgn.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jdbpht.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: onzpwq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dccqyp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qycyhq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ylotge.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: luuymi.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jyxidj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dkyyvp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ojnqpy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: veuibo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dwyvvs.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mgknby.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: gnyoiq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xeuyzh.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xmkske.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uxumpp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uasnos.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vdxosv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tnwywt.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eicsxp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ubumrx.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ybcflo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: iofiur.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qovfco.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: lnsrfu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xuuvfo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xkeubu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uxuxpl.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ufpirp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: kpxpnm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ueqfel.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uayyyl.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tytzka.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qudqik.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: audccc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qfqayo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: izyqkd.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xdkgwd.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mizeex.com replaycode: Name error (3)
                    Source: global trafficTCP traffic: 192.168.2.8:61792 -> 1.1.1.1:53
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:63761 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:64182 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49710
                    Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.8:49704
                    Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49711
                    Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.8:53292
                    Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.8:61145
                    Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.8:61597
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 112.84.177.245
                    Source: unknownTCP traffic detected without corresponding DNS query: 112.84.177.245
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD27A7 GetTempFileNameA,CreateFileA,InternetReadFile,WriteFile,CloseHandle,CreateProcessA,InternetCloseHandle,InternetCloseHandle,6_2_00AD27A7
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: Microsoft-Windows-LiveId%4Operational.evtx.27.drString found in binary or memory: http://Passport.NET/tb
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473262535.00000213BCE49000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473262535.00000213BCE49000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                    Source: lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                    Source: lsass.exe, 00000008.00000002.2750188287.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473505535.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: lsass.exe, 00000008.00000000.1473742432.00000213BD400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2753241698.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
                    Source: lsass.exe, 00000008.00000000.1473328651.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2747533073.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: dllhost.exe, 0000000E.00000003.1497676940.00000184B1510000.00000004.00000800.00020000.00000000.sdmp, V01.log.14.drString found in binary or memory: http://ocsp.digice
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473262535.00000213BCE49000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.digicert.com0:
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.digicert.com0H
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://ocsp.digicert.com0I
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.digicert.com0Q
                    Source: lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.msocsp.com0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.msocsp.com0S
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocspx.digicert.com0E
                    Source: svchost.exe, 0000001A.00000002.2755459692.000001486A5B0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473328651.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2747533073.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://www.digicert.com/CPS0~
                    Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000003.1638909218.0000000000B00000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000AEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/)
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000BDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/R
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/a
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hL
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D18000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com0
                    Source: mssecsvc.exe, 00000006.00000002.1709689615.000000000019D000.00000004.00000010.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1693037455.000000000019C000.00000004.00000010.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2279550385.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                    Source: svchost.exe, 00000022.00000000.1576769823.000001F173E83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LO
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
                    Source: svchost.exe, 00000009.00000000.1487402449.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://az804205.vo.msecnd.net/
                    Source: svchost.exe, 00000009.00000000.1487402449.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://az804205.vo.msecnd.net/f
                    Source: svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://az815563.vo.msecnd.net/
                    Source: svchost.exe, 00000009.00000000.1487448821.00000138EDAA3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2771771623.00000138EDA5F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487356023.00000138EDA5F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772678046.00000138EDAA3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487402449.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.onenote.net/livetile/?Language=
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                    Source: dllhost.exe, 0000000E.00000003.1497676940.00000184B1519000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEn
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-08-30-16/PreSignInSettingsConfig.json
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=13164f2a9ee6956f1439
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=b92552
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59
                    Source: svchost.exe, 00000009.00000002.2774950845.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487880092.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.cn/shellRESP
                    Source: svchost.exe, 00000009.00000002.2774950845.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487880092.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com/shell
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://www.digicert.com/CPS0
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000C41000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://www.office.com/
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50492 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61806
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61906
                    Source: unknownNetwork traffic detected: HTTP traffic on port 61806 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50193
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50492
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                    Source: unknownNetwork traffic detected: HTTP traffic on port 61906 -> 443

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: Yara matchFile source: GeW4GzT8G8.dll, type: SAMPLE
                    Source: Yara matchFile source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1693222311.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.1467969506.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1709919485.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2279802499.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.1507342095.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.1495917347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1196, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                    System Summary

                    barindex
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.24f28c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fc7084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_00AD05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD252F NtOpenSection,6_2_00AD252F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD116F LoadLibraryA,GetModuleHandleA,lstrcat,lstrcatW,CreateEventA,CreateFileMappingA,GetDriveTypeA,GetFileAttributesA,GetFileTime,GetModuleFileNameA,GetSystemTime,GetTempPathA,GetVersion,GetVersionExA,MapViewOfFile,SetEndOfFile,SetFileAttributesA,UnmapViewOfFile,WriteFile,LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD116F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD2574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_00AD2574
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_00AD2477
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD24AE lstrcpyW,lstrlenW,NtCreateSection,6_2_00AD24AE
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD33E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_00AD33E0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD1422
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_00AD3405
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD144A
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE333E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_7FE333E0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE305F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_7FE305F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE324AE lstrcpyW,lstrlenW,NtCreateSection,6_2_7FE324AE
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE32477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_7FE32477
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE32574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_7FE32574
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_7FE3144A
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE31422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_7FE31422
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3252F NtOpenSection,6_2_7FE3252F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_7FE3042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_7FE33405
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE433E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,12_2_7FE433E0
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE405F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,12_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE424AE lstrcpyW,lstrlenW,NtCreateSection,12_2_7FE424AE
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE42574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,12_2_7FE42574
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE42477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,12_2_7FE42477
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,12_2_7FE4144A
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE41422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,12_2_7FE41422
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,12_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4252F NtOpenSection,12_2_7FE4252F
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,12_2_7FE43405
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,17_2_00AA05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA252F NtOpenSection,17_2_00AA252F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,17_2_00AA042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA116F LoadLibraryA,GetModuleHandleA,lstrcat,lstrcatW,CreateEventA,CreateFileMappingA,GetDriveTypeA,GetFileAttributesA,GetFileTime,GetModuleFileNameA,GetSystemTime,GetTempPathA,GetVersion,GetVersionExA,MapViewOfFile,SetEndOfFile,SetFileAttributesA,UnmapViewOfFile,WriteFile,LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_00AA116F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,17_2_00AA2477
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA2574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,17_2_00AA2574
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA24AE lstrcpyW,lstrlenW,NtCreateSection,17_2_00AA24AE
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA33E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_00AA33E0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_00AA1422
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_00AA3405
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_00AA144A
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE433E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_7FE433E0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE405F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,17_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE424AE lstrcpyW,lstrlenW,NtCreateSection,17_2_7FE424AE
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE42574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,17_2_7FE42574
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE42477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,17_2_7FE42477
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_7FE4144A
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE41422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_7FE41422
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,17_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4252F NtOpenSection,17_2_7FE4252F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_7FE43405
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\Microsoft\Protect\S-1-5-18\User\c8310f0f-9ec7-4a2b-8c40-fbafee991f65Jump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD116F6_2_00AD116F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3CF06_2_00AD3CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD28C86_2_00AD28C8
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3CC26_2_00AD3CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3C3D6_2_00AD3C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D366_2_00AD3D36
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D1F6_2_00AD3D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D4B6_2_00AD3D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33CF06_2_7FE33CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33CC26_2_7FE33CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE328C86_2_7FE328C8
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE34C9E6_2_7FE34C9E
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33D4B6_2_7FE33D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33D366_2_7FE33D36
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33C3D6_2_7FE33C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33D1F6_2_7FE33D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43CF012_2_7FE43CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43CC212_2_7FE43CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE428C812_2_7FE428C8
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE44C9E12_2_7FE44C9E
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43D4B12_2_7FE43D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43D3612_2_7FE43D36
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43C3D12_2_7FE43C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43D1F12_2_7FE43D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA116F17_2_00AA116F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3CF017_2_00AA3CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA28C817_2_00AA28C8
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3CC217_2_00AA3CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3C3D17_2_00AA3C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3D3617_2_00AA3D36
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3D1F17_2_00AA3D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3D4B17_2_00AA3D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43CF017_2_7FE43CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43CC217_2_7FE43CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE428C817_2_7FE428C8
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE44C9E17_2_7FE44C9E
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43D4B17_2_7FE43D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43D3617_2_7FE43D36
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43C3D17_2_7FE43C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43D1F17_2_7FE43D1F
                    Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                    Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                    Source: tasksche.exe.12.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                    Source: GeW4GzT8G8.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.24f28c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fc7084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: Security.evtx.27.drBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sysAud
                    Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.27.drBinary string: J\Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
                    Source: System.evtx.27.drBinary string: C:\Device\HarddiskVolume3al0
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeH**
                    Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.27.drBinary string: A\Device\HarddiskVolume3\Program Files\Mozilla Firefox\firefox.exe
                    Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.27.drBinary string: L\Device\HarddiskVolume3\Users\user\AppData\Local\Temp\JSAMSIProvider64.dll6\Device\HarddiskVolume3\Windows\System32\SIHClient.exe
                    Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.27.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    Source: Security.evtx.27.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.syss
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.27.drBinary string: >\Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: \Device\NetbiosSmb
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: System.evtx.27.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4
                    Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.27.drBinary string: T\Device\HarddiskVolume3\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: System.evtx.27.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: System.evtx.27.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.27.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: System.evtx.27.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4%%
                    Source: System.evtx.27.drBinary string: C:\Device\HarddiskVolume3irec`
                    Source: GeW4GzT8G8.dll, tasksche.exe.12.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                    Source: classification engineClassification label: mal100.rans.troj.expl.evad.winDLL@18/72@2/100
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_00AD05F2
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Protect\S-1-5-21-2246122658-3693405117-2476756634-1003\18607d1f-3e87-41d7-b006-51bfc17e9538Jump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6296:120:WilError_03
                    Source: GeW4GzT8G8.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame
                    Source: GeW4GzT8G8.dllReversingLabs: Detection: 94%
                    Source: GeW4GzT8G8.dllVirustotal: Detection: 75%
                    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll"
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGame
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1Jump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGameJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGameJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1Jump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}Jump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: ngcpopkeysrv.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: devobj.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: pcpksp.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: tbs.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: esent.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: GeW4GzT8G8.dllStatic file information: File size 5267459 > 1048576
                    Source: GeW4GzT8G8.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                    Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Diagnostics.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbx source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ~1.PDB @7_9)ux source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error3)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb04 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: mp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorV)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D36 LoadLibraryA,GetProcAddress,LoadLibraryA,GetTickCount,GetVolumeInformationA,GetModuleFileNameA,wsprintfA,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateEventA,socket,connect,GetVersionExA,wsprintfA,CreateThread,CloseHandle,GetTickCount,6_2_00AD3D36

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                    Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                    Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                    Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD41786_2_00AD4178
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE341786_2_7FE34178
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4417812_2_7FE44178
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA417817_2_00AA4178
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4417817_2_7FE44178
                    Source: C:\Windows\mssecsvc.exeEvasive API call chain: GetSystemTime,DecisionNodes,Sleepgraph_12-3973
                    Source: C:\Windows\mssecsvc.exeSpecial instruction interceptor: First address: A718D7 instructions caused by: Self-modifying code
                    Source: C:\Windows\mssecsvc.exeSpecial instruction interceptor: First address: A6B2E5 instructions caused by: Self-modifying code
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D rdtsc 6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                    Source: C:\Windows\mssecsvc.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                    Source: C:\Windows\mssecsvc.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_12-3973
                    Source: C:\Windows\mssecsvc.exeAPI coverage: 6.2 %
                    Source: C:\Windows\mssecsvc.exeAPI coverage: 0.3 %
                    Source: C:\Windows\mssecsvc.exeAPI coverage: 5.9 %
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4417817_2_7FE44178
                    Source: C:\Windows\mssecsvc.exe TID: 6592Thread sleep count: 89 > 30Jump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6592Thread sleep time: -178000s >= -30000sJump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6968Thread sleep count: 125 > 30Jump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6968Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6592Thread sleep time: -86400000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                    Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                    Source: svchost.exe, 0000001B.00000000.1549814166.0000024BD362B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2749546037.0000024BD362B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmicheartbeat
                    Source: mssecsvc.exe, 00000011.00000002.2280369063.0000000000B09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh0|
                    Source: svchost.exe, 0000001B.00000000.1549862680.0000024BD3643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
                    Source: mssecsvc.exe, 00000011.00000002.2280369063.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8l
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: VMware SATA CD00
                    Source: svchost.exe, 00000017.00000000.1524144488.000002238202B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: NECVMWarVMware SATA CD00
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000C35000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1710923691.0000000000C06000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D71000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1499329638.000001CD55600000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2786637408.000001CD55600000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2787499046.000001CD5562B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1499405327.000001CD5562B000.00000004.00000001.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000003.1638909218.0000000000B09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.27.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
                    Source: svchost.exe, 0000001B.00000002.2747358780.0000024BD35D0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pVMwareVirtual disk6000c29198182f16b7176b0e680deba6
                    Source: dwm.exe, 00000012.00000000.1515747636.0000026DACB82000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                    Source: System.evtx.27.drBinary or memory string: VMCI: Using capabilities (0x1c).
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: pVMwareVirtual disk6000c29198182f16b7176b0e680deba68
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
                    Source: mssecsvc.exe, 00000011.00000003.1638909218.0000000000B09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh1}
                    Source: svchost.exe, 00000009.00000002.2770718862.00000138EDA25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: nonicNECVMWarVMware SATA CD00
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
                    Source: svchost.exe, 0000001B.00000000.1551024707.0000024BD5024000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(<
                    Source: svchost.exe, 00000009.00000002.2770718862.00000138EDA25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $@vmicshutdown
                    Source: svchost.exe, 0000001B.00000000.1550978406.0000024BD3FE2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
                    Source: Microsoft-Windows-Ntfs%4Operational.evtx.27.drBinary or memory string: VMware
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @vmicshutdown
                    Source: svchost.exe, 00000009.00000002.2770718862.00000138EDA25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
                    Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.27.drBinary or memory string: VMware Virtual disk 2.0 6000c29198182f16b7176b0e680deba6PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: nonicVMware Virtual disk 6000c29198182f16b7176b0e680deba6
                    Source: svchost.exe, 00000009.00000002.2770929941.00000138EDA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: bfe2-06 @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: WebCacheV01.dat.14.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmicshutdown
                    Source: Microsoft-Windows-WER-PayloadHealth%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: storahciNECVMWarVMware SATA CD00
                    Source: Microsoft-Windows-Partition%4Diagnostic.evtx.27.drBinary or memory string: VMwareVirtual disk2.06000c29198182f16b7176b0e680deba6PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
                    Source: svchost.exe, 0000001B.00000000.1550291143.0000024BD3C60000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 2ue).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
                    Source: lsass.exe, 00000008.00000000.1473215790.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2745366001.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1504826902.0000015870613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.2737709748.0000015870613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1516994559.000002C9AFC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000000.1518368642.000002C06F02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.2731126124.000002C06F02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.2744359671.0000022382041000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1524196197.0000022382041000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000000.1549814166.0000024BD362B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2749546037.0000024BD362B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: LSI_SASVMware Virtual disk 6000c29198182f16b7176b0e680deba6
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $@vmicheartbeat
                    Source: svchost.exe, 00000025.00000000.1585753238.000001EC20C2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
                    Source: svchost.exe, 00000010.00000002.2744929089.000001587066C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: svchost.exe, 00000023.00000000.1580190404.0000023314A02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
                    Source: dwm.exe, 00000012.00000000.1515747636.0000026DACB82000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: C:\Windows\mssecsvc.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D rdtsc 6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3663A LdrInitializeThunk,6_2_7FE3663A
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D36 LoadLibraryA,GetProcAddress,LoadLibraryA,GetTickCount,GetVolumeInformationA,GetModuleFileNameA,wsprintfA,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateEventA,socket,connect,GetVersionExA,wsprintfA,CreateThread,CloseHandle,GetTickCount,6_2_00AD3D36
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD05F2 mov eax, dword ptr fs:[00000030h]6_2_00AD05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D mov eax, dword ptr fs:[00000030h]6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD025E mov edx, dword ptr fs:[00000030h]6_2_00AD025E
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE305F2 mov eax, dword ptr fs:[00000030h]6_2_7FE305F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3025E mov edx, dword ptr fs:[00000030h]6_2_7FE3025E
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3042D mov eax, dword ptr fs:[00000030h]6_2_7FE3042D
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE405F2 mov eax, dword ptr fs:[00000030h]12_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4025E mov edx, dword ptr fs:[00000030h]12_2_7FE4025E
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4042D mov eax, dword ptr fs:[00000030h]12_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA05F2 mov eax, dword ptr fs:[00000030h]17_2_00AA05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA042D mov eax, dword ptr fs:[00000030h]17_2_00AA042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA025E mov edx, dword ptr fs:[00000030h]17_2_00AA025E
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE405F2 mov eax, dword ptr fs:[00000030h]17_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4025E mov edx, dword ptr fs:[00000030h]17_2_7FE4025E
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4042D mov eax, dword ptr fs:[00000030h]17_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess token adjusted: DebugJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\svchost.exeDomain query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeThread created: unknown EIP: 7F5D3C38Jump to behavior
                    Source: C:\Windows\mssecsvc.exeThread created: unknown EIP: 7F5E3C38Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462FE0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462DC0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463620 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462F60 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463710 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462C00 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462FE0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462DC0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463620 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462F60 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463710 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462C00 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\mssecsvc.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\mssecsvc.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\dllhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F30000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320FB0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD555A0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1Jump to behavior
                    Source: dwm.exe, 00000012.00000002.2784770464.0000026DAA594000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 00000012.00000000.1513674447.0000026DAA594000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD116F LoadLibraryA,GetModuleHandleA,lstrcat,lstrcatW,CreateEventA,CreateFileMappingA,GetDriveTypeA,GetFileAttributesA,GetFileTime,GetModuleFileNameA,GetSystemTime,GetTempPathA,GetVersion,GetVersionExA,MapViewOfFile,SetEndOfFile,SetFileAttributesA,UnmapViewOfFile,WriteFile,LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD116F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.27.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.1469139921.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280238468.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719581126.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2777494237.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000000.1579253830.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718396660.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.1551989723.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718267078.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000000.1562843216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000000.1520258438.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000000.1497422002.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718865273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.1513385761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710675304.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712970939.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2719553271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2720264639.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718953458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2718552816.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2719630248.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718375782.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2719418097.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000000.1584365051.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000000.1583741288.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719011781.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718548042.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2719776272.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2718214298.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.1504207342.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2718602569.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720101514.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000000.1556664324.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000000.1570640748.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2719011282.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588780357.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2719447551.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2720025241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2718553282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000000.1545080050.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718952875.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718656610.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2719064286.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000000.1571774510.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718712243.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718209391.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718895917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2719387016.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2719121091.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2718893631.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2720214040.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2777701008.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594507271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2719934656.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.1547825890.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588816089.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718545796.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2718556376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000000.1492508014.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2718554809.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2777494761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000000.1507806969.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2777490892.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.1522321273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000000.1563869827.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718078909.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2718957847.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000000.1532350980.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.1472570641.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2718684916.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594553743.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718378800.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2719525179.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2719008114.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000000.1588961193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718657929.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718502180.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000000.1516012200.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720745515.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2720463440.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.1517859323.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718374412.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718205451.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2777847193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2719199540.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2719360325.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000000.1495914379.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718655372.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2777706559.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000000.1594740605.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2719250523.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000000.1573456651.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.2720028033.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000000.1546866705.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.1483800032.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2718814793.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winlogon.exe PID: 556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 640, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dllhost.exe PID: 5628, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1196, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 372, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 772, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 660, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1100, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1200, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1224, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1648, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1716, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2020, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.1469139921.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280238468.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719581126.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2777494237.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000000.1579253830.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718396660.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.1551989723.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718267078.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000000.1562843216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000000.1520258438.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000000.1497422002.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718865273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.1513385761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710675304.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712970939.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2719553271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2720264639.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718953458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2718552816.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2719630248.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718375782.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2719418097.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000000.1584365051.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000000.1583741288.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719011781.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718548042.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2719776272.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2718214298.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.1504207342.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2718602569.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720101514.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000000.1556664324.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000000.1570640748.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2719011282.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588780357.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2719447551.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2720025241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2718553282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000000.1545080050.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718952875.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718656610.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2719064286.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000000.1571774510.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718712243.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718209391.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718895917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2719387016.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2719121091.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2718893631.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2720214040.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2777701008.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594507271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2719934656.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.1547825890.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588816089.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718545796.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2718556376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000000.1492508014.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2718554809.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2777494761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000000.1507806969.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2777490892.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.1522321273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000000.1563869827.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718078909.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2718957847.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000000.1532350980.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.1472570641.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2718684916.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594553743.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718378800.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2719525179.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2719008114.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000000.1588961193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718657929.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718502180.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000000.1516012200.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720745515.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2720463440.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.1517859323.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718374412.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718205451.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2777847193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2719199540.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2719360325.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000000.1495914379.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718655372.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2777706559.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000000.1594740605.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2719250523.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000000.1573456651.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.2720028033.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000000.1546866705.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.1483800032.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2718814793.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winlogon.exe PID: 556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 640, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dllhost.exe PID: 5628, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1196, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 372, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 772, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 660, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1100, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1200, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1224, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1648, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1716, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2020, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    612
                    Process Injection
                    221
                    Masquerading
                    OS Credential Dumping1
                    Network Share Discovery
                    Remote Services1
                    Archive Collected Data
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Modify Registry
                    LSASS Memory11
                    System Time Discovery
                    Remote Desktop ProtocolData from Removable Media12
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                    Virtualization/Sandbox Evasion
                    Security Account Manager351
                    Security Software Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook612
                    Process Injection
                    NTDS41
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture3
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Install Root Certificate
                    LSA Secrets3
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Rundll32
                    Cached Domain Credentials124
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592021 Sample: GeW4GzT8G8.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 65 euieic.com 2->65 67 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->67 75 Tries to download HTTP data from a sinkholed server 2->75 77 Suricata IDS alerts for network traffic 2->77 79 Malicious sample detected (through community Yara rule) 2->79 83 9 other signatures 2->83 11 loaddll32.exe 1 2->11         started        13 mssecsvc.exe 2->13         started        signatures3 81 Tries to resolve many domain names, but no domain seems valid 65->81 process4 dnsIp5 17 cmd.exe 1 11->17         started        19 rundll32.exe 11->19         started        22 rundll32.exe 1 11->22         started        25 conhost.exe 11->25         started        69 192.168.2.100 unknown unknown 13->69 71 192.168.2.102 unknown unknown 13->71 73 98 other IPs or domains 13->73 105 Connects to many different private IPs via SMB (likely to spread or exploit) 13->105 107 Connects to many different private IPs (likely to spread or exploit) 13->107 109 Changes memory attributes in foreign processes to executable or writable 13->109 111 4 other signatures 13->111 27 svchost.exe 13->27 injected 29 svchost.exe 13->29 injected 31 svchost.exe 13->31 injected 33 11 other processes 13->33 signatures6 process7 file8 35 rundll32.exe 17->35         started        85 Drops executables to the windows directory (C:\Windows) and starts them 19->85 37 mssecsvc.exe 7 19->37         started        57 C:\Windows\mssecsvc.exe, PE32 22->57 dropped signatures9 process10 file11 40 mssecsvc.exe 7 35->40         started        55 C:\Windows\tasksche.exe, PE32 37->55 dropped process12 signatures13 87 Antivirus detection for dropped file 40->87 89 Multi AV Scanner detection for dropped file 40->89 91 Machine Learning detection for dropped file 40->91 93 8 other signatures 40->93 43 lsass.exe 14 40->43 injected 46 svchost.exe 3 40->46 injected 48 svchost.exe 40->48 injected 51 14 other processes 40->51 process14 dnsIp15 95 Installs new ROOT certificates 43->95 97 Creates files in the system32 config directory 43->97 99 Writes to foreign memory regions 43->99 101 System process connects to network (likely due to code injection or exploit) 46->101 53 dllhost.exe 7 46->53         started        59 zjaxax.com 48->59 61 yuaame.com 48->61 63 160 other IPs or domains 48->63 signatures16 103 Tries to resolve many domain names, but no domain seems valid 61->103 process17

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.