Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_327.dll

Overview

General Information

Sample name:LisectAVT_2403002A_327.dll
Analysis ID:1482334
MD5:40730e4027614dd45d6aae3f4dca0a48
SHA1:13d9812a91640771c4acc6f98aef1d1b28a38b1c
SHA256:527d79357bf1ec94197e8e9cd404073060508ad7a77b714cc7c2f2e34ad08623
Tags:dllexeWannaCry
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7304 cmdline: loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7396 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7416 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 7444 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 60A91A498C0F1FFDDEF484C5A4D42564)
    • rundll32.exe (PID: 7404 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002A_327.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7648 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 7664 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 60A91A498C0F1FFDDEF484C5A4D42564)
  • svchost.exe (PID: 7564 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • mssecsvr.exe (PID: 7616 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: 60A91A498C0F1FFDDEF484C5A4D42564)
  • svchost.exe (PID: 2332 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
LisectAVT_2403002A_327.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    LisectAVT_2403002A_327.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    • 0x38b0a:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    • 0x387e4:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
    • 0x383d0:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
    LisectAVT_2403002A_327.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\mssecsvr.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\mssecsvr.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0x3136c:$x3: tasksche.exe
      • 0x4157c:$x3: tasksche.exe
      • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0x415d0:$x5: WNcry@2ol7
      • 0x31344:$x8: C:\%s\qeriuwjhrf
      • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xe034:$s1: C:\%s\%s
      • 0x17338:$s1: C:\%s\%s
      • 0x31358:$s1: C:\%s\%s
      • 0x414d0:$s3: cmd.exe /c "%s"
      • 0x73a24:$s4: msg/m_portuguese.wnry
      • 0x2e68c:$s5: \\192.168.56.20\IPC$
      • 0x1ba81:$s6: \\172.16.99.5\IPC$
      • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
      • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
      • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
      • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x34780:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x3436c:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\mssecsvr.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
      • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
      • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
      • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
      • 0x1d439:$s1: __TREEID__PLACEHOLDER__
      • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
      • 0x1f508:$s1: __TREEID__PLACEHOLDER__
      • 0x20570:$s1: __TREEID__PLACEHOLDER__
      • 0x215d8:$s1: __TREEID__PLACEHOLDER__
      • 0x22640:$s1: __TREEID__PLACEHOLDER__
      • 0x236a8:$s1: __TREEID__PLACEHOLDER__
      • 0x24710:$s1: __TREEID__PLACEHOLDER__
      • 0x25778:$s1: __TREEID__PLACEHOLDER__
      • 0x267e0:$s1: __TREEID__PLACEHOLDER__
      • 0x27848:$s1: __TREEID__PLACEHOLDER__
      • 0x288b0:$s1: __TREEID__PLACEHOLDER__
      • 0x29918:$s1: __TREEID__PLACEHOLDER__
      • 0x2a980:$s1: __TREEID__PLACEHOLDER__
      • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
      • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e340:$s1: __TREEID__PLACEHOLDER__
      C:\Windows\mssecsvr.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvr.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
      • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
      • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      0000000B.00000000.1326342765.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000B.00000002.1341643809.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            00000006.00000000.1297845687.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              9.2.mssecsvr.exe.22778c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              9.2.mssecsvr.exe.1d4f084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              6.2.mssecsvr.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                6.2.mssecsvr.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                6.2.mssecsvr.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 117 entries

                System Summary

                barindex
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, ProcessId: 7564, ProcessName: svchost.exe
                No Snort rule has matched
                Timestamp:2024-07-25T21:34:55.923849+0200
                SID:2022930
                Source Port:443
                Destination Port:50078
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:2024-07-25T21:34:02.298829+0200
                SID:2830018
                Source Port:53342
                Destination Port:53
                Protocol:UDP
                Classtype:A Network Trojan was detected
                Timestamp:2024-07-25T21:34:15.727764+0200
                SID:2001569
                Source Port:49831
                Destination Port:445
                Protocol:TCP
                Classtype:Misc activity
                Timestamp:2024-07-25T21:34:17.088039+0200
                SID:2022930
                Source Port:443
                Destination Port:49821
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: LisectAVT_2403002A_327.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/cAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234eaAvira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5efAvira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)Avira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/M:Avira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234Avira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/aAvira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/4Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5efcdAvira URL Cloud: Label: malware
                Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwerAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/DAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5beAvira URL Cloud: Label: malware
                Source: C:\Windows\mssecsvr.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.2% probability
                Source: C:\Windows\mssecsvr.exeJoe Sandbox ML: detected
                Source: LisectAVT_2403002A_327.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: LisectAVT_2403002A_327.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.7:49821 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.7:50078 version: TLS 1.2
                Source: unknownNetwork traffic detected: IP country count 10
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20240726-0534-0355-9ff5-0a1ebde5efcd HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1721936043.4587265
                Source: global trafficHTTP traffic detected: GET /?subid1=20240726-0534-041f-8fb2-8866394234ea HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20240726-0534-055f-94f1-815196e9c5be HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=39fec269-4c93-4234-939b-afff81d34501
                Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.74
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.74
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.74
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.74
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 64.16.93.1
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.0
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.0
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.0
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.0
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 6.118.192.1
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.210
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.210
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.210
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.210
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 185.127.160.1
                Source: unknownTCP traffic detected without corresponding DNS query: 119.225.62.88
                Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cmhE9WbprTxRD5l&MD=pYgsfsSr HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
                Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cmhE9WbprTxRD5l&MD=pYgsfsSr HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20240726-0534-0355-9ff5-0a1ebde5efcd HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1721936043.4587265
                Source: global trafficHTTP traffic detected: GET /?subid1=20240726-0534-041f-8fb2-8866394234ea HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20240726-0534-055f-94f1-815196e9c5be HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=39fec269-4c93-4234-939b-afff81d34501
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: time.windows.com
                Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1971801364.0000000000AF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1337589646.0000000000C36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5ef
                Source: mssecsvr.exe, 00000009.00000002.1971801364.0000000000B3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234
                Source: mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5
                Source: mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/D
                Source: mssecsvr.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000009.00000002.1971801364.0000000000AF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000BCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)
                Source: mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                Source: mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/4
                Source: mssecsvr.exe, 00000009.00000002.1971801364.0000000000AF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/M:
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/a
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/c
                Source: mssecsvr.exe, 00000009.00000002.1971351728.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJO
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comc
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50078
                Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
                Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.7:49821 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.7:50078 version: TLS 1.2

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: LisectAVT_2403002A_327.dll, type: SAMPLE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.1d4f084.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.22778c8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.1d5e104.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.1d5a0a4.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000000.1326342765.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1341643809.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1297845687.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1297973978.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000000.1322838033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.1326501700.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1972575394.0000000001D5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000000.1322719614.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1972756937.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7616, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7664, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\mssecsvr.exe, type: DROPPED

                System Summary

                barindex
                Source: LisectAVT_2403002A_327.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: LisectAVT_2403002A_327.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.22778c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d4f084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.1d4f084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d4f084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.22778c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.22778c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.1d5e104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d5e104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.1d5a0a4.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.1d5a0a4.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1297973978.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.1322838033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.1326501700.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1972575394.0000000001D5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.1972756937.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: mssecsvr.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: LisectAVT_2403002A_327.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: LisectAVT_2403002A_327.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: LisectAVT_2403002A_327.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.22778c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d4f084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.22a996c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.1d81128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.2.mssecsvr.exe.1d5e104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.1d4f084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d4f084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.22778c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.22778c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.22a996c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.1d81128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.1d5e104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d5e104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.1d5a0a4.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.1d5a0a4.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1297973978.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.1322838033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.1326501700.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1972575394.0000000001D5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.1972756937.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: LisectAVT_2403002A_327.dll, mssecsvr.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@3/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,FindCloseChangeNotification,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 9_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,9_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7320:120:WilError_03
                Source: LisectAVT_2403002A_327.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002A_327.dll,PlayGame
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002A_327.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002A_327.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: LisectAVT_2403002A_327.dllStatic file information: File size 5267470 > 1048576
                Source: LisectAVT_2403002A_327.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7712Thread sleep count: 99 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7712Thread sleep time: -198000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7716Thread sleep count: 126 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7716Thread sleep count: 42 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7712Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: Amcache.hve.6.drBinary or memory string: VMware
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000BCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: mssecsvr.exe, 00000006.00000002.1337589646.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1971801364.0000000000AF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1971801364.0000000000B3E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A8E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: svchost.exe, 00000008.00000002.2546611181.0000025798630000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWF
                Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1Jump to behavior
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                14
                Windows Service
                14
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Rundll32
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1482334 Sample: LisectAVT_2403002A_327.dll Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 38 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->38 40 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->40 42 2 other IPs or domains 2->42 54 Malicious sample detected (through community Yara rule) 2->54 56 Antivirus detection for URL or domain 2->56 58 Antivirus / Scanner detection for submitted sample 2->58 60 3 other signatures 2->60 9 loaddll32.exe 1 2->9         started        11 mssecsvr.exe 12 2->11         started        15 svchost.exe 2->15         started        17 svchost.exe 2->17         started        signatures3 process4 dnsIp5 19 cmd.exe 1 9->19         started        21 rundll32.exe 9->21         started        24 rundll32.exe 1 9->24         started        27 conhost.exe 9->27         started        44 192.168.2.100 unknown unknown 11->44 46 192.168.2.101 unknown unknown 11->46 48 98 other IPs or domains 11->48 64 Connects to many different private IPs via SMB (likely to spread or exploit) 11->64 66 Connects to many different private IPs (likely to spread or exploit) 11->66 signatures6 process7 file8 29 rundll32.exe 19->29         started        62 Drops executables to the windows directory (C:\Windows) and starts them 21->62 31 mssecsvr.exe 13 21->31         started        36 C:\Windows\mssecsvr.exe, PE32 24->36 dropped signatures9 process10 process11 33 mssecsvr.exe 13 29->33         started        signatures12 50 Antivirus detection for dropped file 33->50 52 Machine Learning detection for dropped file 33->52

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                LisectAVT_2403002A_327.dll100%AviraTR/AD.WannaCry.nvufj
                LisectAVT_2403002A_327.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\mssecsvr.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvr.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://upx.sf.net0%URL Reputationsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/c100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234ea100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5ef100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/M:100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/a100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/4100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5efcd100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJO0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/D100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5be100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comc0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.226
                truefalse
                  unknown
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    unknown
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      unknown
                      time.windows.com
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234eafalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5efcdfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5befalse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/M:mssecsvr.exe, 00000009.00000002.1971801364.0000000000AF8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)mssecsvr.exe, 00000006.00000002.1337589646.0000000000BCE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&mssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.1337589646.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1971801364.0000000000AF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5efmssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1337589646.0000000000C36000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.commssecsvr.exe.4.drfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/cmssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/amssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234mssecsvr.exe, 00000009.00000002.1971801364.0000000000B3E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://upx.sf.netAmcache.hve.6.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000009.00000002.1971351728.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Dmssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvr.exe, 0000000B.00000002.1342028253.0000000000A38000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/4mssecsvr.exe, 0000000B.00000002.1342028253.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJOmssecsvr.exe, 0000000B.00000002.1342028253.0000000000A38000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comcmssecsvr.exe, 00000006.00000002.1337589646.0000000000C0F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        185.124.94.222
                        unknownFinland
                        198024FI-ISTEKKI-ASFIfalse
                        199.207.38.1
                        unknownUnited States
                        7227KPMGL-ASUSfalse
                        95.210.118.1
                        unknownItaly
                        29286SKYLOGIC-ASITfalse
                        119.225.62.88
                        unknownAustralia
                        7474OPTUSCOM-AS01-AUSingTelOptusPtyLtdAUfalse
                        4.84.89.1
                        unknownUnited States
                        3356LEVEL3USfalse
                        199.180.31.91
                        unknownCanada
                        325364WEB-CAfalse
                        132.107.82.189
                        unknownUnited States
                        306DNIC-ASBLK-00306-00371USfalse
                        188.219.99.197
                        unknownItaly
                        30722VODAFONE-IT-ASNITfalse
                        16.68.196.1
                        unknownUnited States
                        unknownunknownfalse
                        13.55.192.1
                        unknownUnited States
                        16509AMAZON-02USfalse
                        136.185.8.1
                        unknownIndia
                        3455WAUSAU-INSUSfalse
                        80.67.170.1
                        unknownFrance
                        20766GITOYEN-MAIN-ASThemainAutonomousSystemofGitoyenParisfalse
                        95.43.108.1
                        unknownBulgaria
                        8866BTC-ASBULGARIABGfalse
                        210.44.60.232
                        unknownChina
                        4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                        IP
                        192.168.2.148
                        192.168.2.149
                        192.168.2.146
                        192.168.2.147
                        192.168.2.140
                        192.168.2.141
                        192.168.2.144
                        192.168.2.145
                        192.168.2.142
                        192.168.2.143
                        192.168.2.159
                        192.168.2.157
                        192.168.2.158
                        192.168.2.151
                        192.168.2.152
                        192.168.2.150
                        192.168.2.155
                        192.168.2.156
                        192.168.2.153
                        192.168.2.154
                        192.168.2.126
                        192.168.2.247
                        192.168.2.127
                        192.168.2.248
                        192.168.2.124
                        192.168.2.245
                        192.168.2.125
                        192.168.2.246
                        192.168.2.128
                        192.168.2.249
                        192.168.2.129
                        192.168.2.240
                        192.168.2.122
                        192.168.2.243
                        192.168.2.123
                        192.168.2.244
                        192.168.2.120
                        192.168.2.241
                        192.168.2.121
                        192.168.2.242
                        192.168.2.97
                        192.168.2.137
                        192.168.2.96
                        192.168.2.138
                        192.168.2.99
                        192.168.2.135
                        192.168.2.98
                        192.168.2.136
                        192.168.2.139
                        192.168.2.250
                        192.168.2.130
                        192.168.2.251
                        192.168.2.91
                        192.168.2.90
                        192.168.2.93
                        192.168.2.133
                        192.168.2.254
                        192.168.2.92
                        192.168.2.134
                        192.168.2.95
                        192.168.2.131
                        192.168.2.252
                        192.168.2.94
                        192.168.2.132
                        192.168.2.253
                        192.168.2.104
                        192.168.2.225
                        192.168.2.105
                        192.168.2.226
                        192.168.2.102
                        192.168.2.223
                        192.168.2.103
                        192.168.2.224
                        192.168.2.108
                        192.168.2.229
                        192.168.2.109
                        192.168.2.106
                        192.168.2.227
                        192.168.2.107
                        192.168.2.228
                        192.168.2.100
                        192.168.2.221
                        192.168.2.101
                        192.168.2.222
                        192.168.2.220
                        10.54.96.1
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1482334
                        Start date and time:2024-07-25 21:33:02 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 43s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:17
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:LisectAVT_2403002A_327.dll
                        Detection:MAL
                        Classification:mal100.rans.expl.evad.winDLL@20/2@3/100
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .dll
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded IPs from analysis (whitelisted): 20.101.57.9, 2.19.126.137
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: LisectAVT_2403002A_327.dll
                        TimeTypeDescription
                        15:34:04API Interceptor1x Sleep call for process: loaddll32.exe modified
                        16:49:48API Interceptor112x Sleep call for process: mssecsvr.exe modified
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        77026.bodis.comIa93PTYivQ.exeGet hashmaliciousBlackMoon, NeshtaBrowse
                        • 199.59.243.226
                        gUJak0onLk.elfGet hashmaliciousUnknownBrowse
                        • 199.59.243.226
                        yrBA01LVo2.exeGet hashmaliciousWannacryBrowse
                        • 199.59.243.226
                        http://sectocarewl.online/mona-michelle/Get hashmaliciousUnknownBrowse
                        • 199.59.243.226
                        file.exeGet hashmaliciousCMSBruteBrowse
                        • 199.59.243.225
                        SlHgSOYcMY.exeGet hashmaliciousUnknownBrowse
                        • 199.59.243.225
                        https://upsmychoicedeals.comGet hashmaliciousUnknownBrowse
                        • 199.59.243.225
                        http://free.filesearch.club/?q=grade+9+core+french+textbookGet hashmaliciousUnknownBrowse
                        • 199.59.243.225
                        PaDQmSw2ud.dllGet hashmaliciousLaplas ClipperBrowse
                        • 199.59.243.225
                        PaDQmSw2ud.dllGet hashmaliciousLaplas ClipperBrowse
                        • 199.59.243.225
                        www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comyrBA01LVo2.exeGet hashmaliciousWannacryBrowse
                        • 103.224.212.215
                        lJt3mQqCQl.dllGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        xIwkOnjSIa.dllGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        IU28r0EZFA.dllGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        ViNIRfmQmE.dllGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        Ee3RWj3ID9.exeGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        YB7v7UFV3j.exeGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        B0U3oOhQJu.exeGet hashmaliciousWannacryBrowse
                        • 103.224.212.220
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        KPMGL-ASUSsh4.elfGet hashmaliciousMiraiBrowse
                        • 199.207.116.185
                        bolonetwork.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 199.207.187.38
                        TV7RLVOmvl.elfGet hashmaliciousMiraiBrowse
                        • 199.207.163.27
                        pDWZMd3100.elfGet hashmaliciousMirai, GafgytBrowse
                        • 199.207.138.92
                        GcOeQTPzrh.elfGet hashmaliciousUnknownBrowse
                        • 199.207.163.40
                        DHz0sMSRlg.elfGet hashmaliciousMiraiBrowse
                        • 199.207.204.158
                        bot.mpsl-20240324-1846.elfGet hashmaliciousMirai, MoobotBrowse
                        • 199.207.187.36
                        huhu.x86_64.elfGet hashmaliciousMirai, OkiruBrowse
                        • 199.207.163.44
                        huhu.arm.elfGet hashmaliciousMiraiBrowse
                        • 199.207.163.23
                        28zfOuBIRZ.elfGet hashmaliciousMiraiBrowse
                        • 199.207.116.199
                        OPTUSCOM-AS01-AUSingTelOptusPtyLtdAUvQPpTr8mfm.elfGet hashmaliciousMiraiBrowse
                        • 220.101.95.182
                        eW8ah5TCen.elfGet hashmaliciousUnknownBrowse
                        • 220.101.95.185
                        https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fyourremittance.com.au%2ft%2fs%2fUD5xw4r&umid=cc04381d-8482-4529-83d6-e97329962ac3&auth=3a5566c60b1f4d8525fa8ab109f94675a663eb25-bbc82991079aa7c5d0d2ec918ad27ef8f965c70aGet hashmaliciousUnknownBrowse
                        • 223.27.177.69
                        o85sjrF5oi.elfGet hashmaliciousUnknownBrowse
                        • 203.16.141.225
                        V7UaNBrX72.elfGet hashmaliciousMirai, MoobotBrowse
                        • 203.202.66.255
                        LEpsypIZxU.elfGet hashmaliciousMirai, MoobotBrowse
                        • 203.18.174.201
                        cEEsFMSdw8.elfGet hashmaliciousMiraiBrowse
                        • 59.154.22.248
                        SJ5SyRpCFA.elfGet hashmaliciousUnknownBrowse
                        • 59.154.199.208
                        16knGm6BfY.elfGet hashmaliciousMirai, MoobotBrowse
                        • 125.63.206.165
                        i586.elfGet hashmaliciousMirai, GafgytBrowse
                        • 156.50.126.193
                        SKYLOGIC-ASITLisectAVT_2403002A_80.exeGet hashmaliciousGuLoaderBrowse
                        • 84.247.147.161
                        LisectAVT_2403002A_80.exeGet hashmaliciousGuLoaderBrowse
                        • 84.247.147.161
                        Lisect_AVT_24003_G1B_122.exeGet hashmaliciousUnknownBrowse
                        • 154.73.28.157
                        gw3yTM2uiZ.elfGet hashmaliciousMiraiBrowse
                        • 5.61.193.147
                        arm5-20240623-2204.elfGet hashmaliciousMiraiBrowse
                        • 197.234.45.5
                        033MSOG241591GHD.out.vbsGet hashmaliciousUnknownBrowse
                        • 84.247.168.16
                        sYgsg1JAC0.elfGet hashmaliciousMiraiBrowse
                        • 213.209.187.32
                        j5pd3mg5a4.elfGet hashmaliciousMirai, MoobotBrowse
                        • 213.16.215.3
                        Mt5VyD087r.elfGet hashmaliciousMiraiBrowse
                        • 197.234.45.7
                        1Q1yL9boQn.exeGet hashmaliciousAsyncRATBrowse
                        • 84.247.154.81
                        FI-ISTEKKI-ASFI5QXQt577gu.elfGet hashmaliciousUnknownBrowse
                        • 31.172.156.2
                        7cG80udQjG.elfGet hashmaliciousMiraiBrowse
                        • 31.172.156.9
                        47RMaTbdd4Get hashmaliciousMiraiBrowse
                        • 31.172.156.8
                        armGet hashmaliciousMiraiBrowse
                        • 31.172.156.1
                        EHqBakwhNUGet hashmaliciousUnknownBrowse
                        • 31.172.152.43
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        28a2c9bd18a11de089ef85a160da29e4LisectAVT_2403002A_349.exeGet hashmaliciousUnknownBrowse
                        • 20.114.59.183
                        LisectAVT_2403002A_362.exeGet hashmaliciousUnknownBrowse
                        • 20.114.59.183
                        https://pousadaalgodaodapraia.com.br/wp-includes/Kinsh.htmlGet hashmaliciousUnknownBrowse
                        • 20.114.59.183
                        http://www.artisteer.com/?p=affr&redirect_url=https://tdg.site4clientdemo.com/vendor/bin/hereme/43432/6467r/biddept@lakeshorelearning.comGet hashmaliciousHTMLPhisherBrowse
                        • 20.114.59.183
                        http://exchange.adsbymediavine.com/usersync/syncGet hashmaliciousUnknownBrowse
                        • 20.114.59.183
                        https://forms.office.com/r/2sQKUFgdzEGet hashmaliciousHTMLPhisherBrowse
                        • 20.114.59.183
                        https://cutt.ly/98486848789-form-sharepolnt-PROJECTJULY2024-pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                        • 20.114.59.183
                        https://url.us.m.mimecastprotect.com/s/E8trC5yxE7iZK9MZ8-vlGet hashmaliciousUnknownBrowse
                        • 20.114.59.183
                        LisectAVT_2403002A_473.exeGet hashmaliciousNjrat, XWormBrowse
                        • 20.114.59.183
                        http://littlebighero.chGet hashmaliciousUnknownBrowse
                        • 20.114.59.183
                        No context
                        Process:C:\Windows\mssecsvr.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.41396277039335
                        Encrypted:false
                        SSDEEP:6144:ncifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNb5+:ci58oSWIZBk2MM6AFBZo
                        MD5:AD08CADF252A271ADF997A69096E825D
                        SHA1:076825D458B6F35FBCFA9C9C7D6B3AFE87723CD7
                        SHA-256:C2985FC0E20305ECF8EE629831EEC2DFB0ED0769E4939C1C9FC1C162304D90B8
                        SHA-512:3A103AD0B66C16CF99F8486B91908BFB4280388B6833AC4B33C5358C5336AA182B870FA4BA7867837B69C163BC13CEFE1A63F404EA1E77DF25D8D65E3B97F133
                        Malicious:false
                        Reputation:low
                        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm2.#.................................................................................................................................................................................................................................................................................................................................................].5.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\rundll32.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):2281472
                        Entropy (8bit):4.118469343904641
                        Encrypted:false
                        SSDEEP:12288:eQbLgmluyQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEXF5:VbLguVQhfdmMSirYbcMNgef0QeQjG
                        MD5:60A91A498C0F1FFDDEF484C5A4D42564
                        SHA1:A15DCD408C0AEE1F5F38B50528583BDEE6536227
                        SHA-256:03DC66C9970481C5958D247F9EBA93A6A7AD9F9BBF94845B9FBEA8ED1E1E0757
                        SHA-512:E7B7A308227FC3C72D8D1BD262389257E1F2FA419F6CEFF58F73A06F850245F6E1068EA74CF42388EE2CA2712D7B5D9A2CE0E6F7264C3885B82C1CAA70891E55
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvr.exe, Author: ReversingLabs
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L......................"...................@...........................P......................................................1..z...........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc.........1...... ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):2.0274814419049543
                        TrID:
                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                        • Generic Win/DOS Executable (2004/3) 0.20%
                        • DOS Executable Generic (2002/1) 0.20%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:LisectAVT_2403002A_327.dll
                        File size:5'267'470 bytes
                        MD5:40730e4027614dd45d6aae3f4dca0a48
                        SHA1:13d9812a91640771c4acc6f98aef1d1b28a38b1c
                        SHA256:527d79357bf1ec94197e8e9cd404073060508ad7a77b714cc7c2f2e34ad08623
                        SHA512:e5c0227ad427bdc90ca6001f9284bdb5b54f247c6b19dedc30a951f908fe1f8799294649bc647209482c84c900d21783d1c18d533644f64b38efd51d8d8ec0f5
                        SSDEEP:12288:TQbLgmluyQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEXF5:MbLguVQhfdmMSirYbcMNgef0QeQjG
                        TLSH:2436235A766C91FCC10A627574634926E6B73C5A22BD960F8F908B520C137A0FF78F4B
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                        Icon Hash:7ae282899bbab082
                        Entrypoint:0x100011e9
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x10000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                        DLL Characteristics:
                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                        Instruction
                        push ebp
                        mov ebp, esp
                        push ebx
                        mov ebx, dword ptr [ebp+08h]
                        push esi
                        mov esi, dword ptr [ebp+0Ch]
                        push edi
                        mov edi, dword ptr [ebp+10h]
                        test esi, esi
                        jne 00007F1430DE071Bh
                        cmp dword ptr [10003140h], 00000000h
                        jmp 00007F1430DE0738h
                        cmp esi, 01h
                        je 00007F1430DE0717h
                        cmp esi, 02h
                        jne 00007F1430DE0734h
                        mov eax, dword ptr [10003150h]
                        test eax, eax
                        je 00007F1430DE071Bh
                        push edi
                        push esi
                        push ebx
                        call eax
                        test eax, eax
                        je 00007F1430DE071Eh
                        push edi
                        push esi
                        push ebx
                        call 00007F1430DE062Ah
                        test eax, eax
                        jne 00007F1430DE0716h
                        xor eax, eax
                        jmp 00007F1430DE0760h
                        push edi
                        push esi
                        push ebx
                        call 00007F1430DE04DCh
                        cmp esi, 01h
                        mov dword ptr [ebp+0Ch], eax
                        jne 00007F1430DE071Eh
                        test eax, eax
                        jne 00007F1430DE0749h
                        push edi
                        push eax
                        push ebx
                        call 00007F1430DE0606h
                        test esi, esi
                        je 00007F1430DE0717h
                        cmp esi, 03h
                        jne 00007F1430DE0738h
                        push edi
                        push esi
                        push ebx
                        call 00007F1430DE05F5h
                        test eax, eax
                        jne 00007F1430DE0715h
                        and dword ptr [ebp+0Ch], eax
                        cmp dword ptr [ebp+0Ch], 00000000h
                        je 00007F1430DE0723h
                        mov eax, dword ptr [10003150h]
                        test eax, eax
                        je 00007F1430DE071Ah
                        push edi
                        push esi
                        push ebx
                        call eax
                        mov dword ptr [ebp+0Ch], eax
                        mov eax, dword ptr [ebp+0Ch]
                        pop edi
                        pop esi
                        pop ebx
                        pop ebp
                        retn 000Ch
                        jmp dword ptr [10002028h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        Programming Language:
                        • [ C ] VS98 (6.0) build 8168
                        • [C++] VS98 (6.0) build 8168
                        • [RES] VS98 (6.0) cvtres build 1720
                        • [LNK] VS98 (6.0) imp/exp build 8168
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x40000x5000600x501000d584d66e67c2a91c2f940577173b4a2cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        W0x40600x500000dataEnglishUnited States0.8100900650024414
                        DLLImport
                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                        NameOrdinalAddress
                        PlayGame10x10001114
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                        2024-07-25T21:34:55.923849+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435007820.114.59.183192.168.2.7
                        2024-07-25T21:34:02.298829+0200UDP2830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)5334253192.168.2.71.1.1.1
                        2024-07-25T21:34:15.727764+0200TCP2001569ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection49831445192.168.2.736.4.231.1
                        2024-07-25T21:34:17.088039+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434982120.114.59.183192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 25, 2024 21:33:54.413325071 CEST49671443192.168.2.7204.79.197.203
                        Jul 25, 2024 21:33:54.928981066 CEST49674443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:33:54.929008961 CEST49675443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:33:55.069614887 CEST49672443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:33:58.429905891 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:33:58.803946972 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:33:59.225819111 CEST49671443192.168.2.7204.79.197.203
                        Jul 25, 2024 21:33:59.553942919 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:34:01.054023981 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:34:02.521534920 CEST4969980192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:02.526689053 CEST8049699103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:02.526837111 CEST4969980192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:02.529356956 CEST4969980192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:02.534260988 CEST8049699103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:03.214509964 CEST8049699103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:03.214580059 CEST4969980192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:03.214668036 CEST8049699103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:03.214720011 CEST4969980192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:03.328538895 CEST4969980192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:03.333822966 CEST8049699103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:03.733755112 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:03.738692999 CEST8049700199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:03.738897085 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:03.739309072 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:03.744160891 CEST8049700199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:04.038475037 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:34:04.264836073 CEST8049700199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:04.265207052 CEST8049700199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:04.265258074 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:04.265258074 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:04.270350933 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:04.270350933 CEST4970080192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:04.371855974 CEST4970180192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:04.376908064 CEST8049701103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:04.377006054 CEST4970180192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:04.377120972 CEST4970180192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:04.381889105 CEST8049701103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:04.538321972 CEST49674443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:04.538348913 CEST49675443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:04.671118975 CEST49672443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:04.919166088 CEST4970280192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:04.926316977 CEST8049702103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:04.926419973 CEST4970280192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:04.926732063 CEST4970280192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:04.933995962 CEST8049702103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.012617111 CEST8049701103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.012706041 CEST4970180192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:05.013691902 CEST8049701103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.013761997 CEST4970180192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:05.016984940 CEST4970180192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:05.019659996 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.021807909 CEST8049701103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.024599075 CEST8049703199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:05.024699926 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.024918079 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.029654980 CEST8049703199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:05.520668983 CEST8049703199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:05.520772934 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.521080971 CEST8049703199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:05.521287918 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.535195112 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.535240889 CEST4970380192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.547842979 CEST8049702103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.547923088 CEST4970280192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:05.552762032 CEST8049702103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.552840948 CEST4970280192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:05.583702087 CEST4970280192.168.2.7103.224.212.215
                        Jul 25, 2024 21:34:05.585968971 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.588645935 CEST8049702103.224.212.215192.168.2.7
                        Jul 25, 2024 21:34:05.591228008 CEST8049704199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:05.591662884 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.592134953 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:05.596911907 CEST8049704199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:05.612359047 CEST49705445192.168.2.764.16.93.74
                        Jul 25, 2024 21:34:05.617364883 CEST4454970564.16.93.74192.168.2.7
                        Jul 25, 2024 21:34:05.617439032 CEST49705445192.168.2.764.16.93.74
                        Jul 25, 2024 21:34:05.618485928 CEST49705445192.168.2.764.16.93.74
                        Jul 25, 2024 21:34:05.618866920 CEST49706445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.623920918 CEST4454970664.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:05.623934984 CEST4454970564.16.93.74192.168.2.7
                        Jul 25, 2024 21:34:05.623995066 CEST49705445192.168.2.764.16.93.74
                        Jul 25, 2024 21:34:05.624036074 CEST49706445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.624217987 CEST49706445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.628165007 CEST49707445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.629666090 CEST4454970664.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:05.629720926 CEST49706445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.633161068 CEST4454970764.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:05.633233070 CEST49707445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.633271933 CEST49707445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:05.638190031 CEST4454970764.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:06.150805950 CEST8049704199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:06.151002884 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:06.151657104 CEST8049704199.59.243.226192.168.2.7
                        Jul 25, 2024 21:34:06.151789904 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:06.159357071 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:06.159380913 CEST4970480192.168.2.7199.59.243.226
                        Jul 25, 2024 21:34:07.113730907 CEST44349698104.98.116.138192.168.2.7
                        Jul 25, 2024 21:34:07.113868952 CEST49698443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:07.671152115 CEST49730445192.168.2.710.54.96.181
                        Jul 25, 2024 21:34:07.676218033 CEST4454973010.54.96.181192.168.2.7
                        Jul 25, 2024 21:34:07.676340103 CEST49730445192.168.2.710.54.96.181
                        Jul 25, 2024 21:34:07.676565886 CEST49730445192.168.2.710.54.96.181
                        Jul 25, 2024 21:34:07.677537918 CEST49731445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.682487011 CEST4454973110.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:07.682568073 CEST4454973010.54.96.181192.168.2.7
                        Jul 25, 2024 21:34:07.682574987 CEST49731445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.682622910 CEST49730445192.168.2.710.54.96.181
                        Jul 25, 2024 21:34:07.682626009 CEST49731445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.684264898 CEST49732445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.689011097 CEST4454973110.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:07.689074993 CEST49731445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.689110994 CEST4454973210.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:07.689173937 CEST49732445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.689558983 CEST49732445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:07.694314003 CEST4454973210.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:08.835287094 CEST49671443192.168.2.7204.79.197.203
                        Jul 25, 2024 21:34:09.665077925 CEST49755445192.168.2.76.118.192.0
                        Jul 25, 2024 21:34:09.670084953 CEST445497556.118.192.0192.168.2.7
                        Jul 25, 2024 21:34:09.670195103 CEST49755445192.168.2.76.118.192.0
                        Jul 25, 2024 21:34:09.670278072 CEST49755445192.168.2.76.118.192.0
                        Jul 25, 2024 21:34:09.670543909 CEST49756445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.675441027 CEST445497566.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:09.675570965 CEST49756445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.675581932 CEST49756445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.675997019 CEST445497556.118.192.0192.168.2.7
                        Jul 25, 2024 21:34:09.676055908 CEST49755445192.168.2.76.118.192.0
                        Jul 25, 2024 21:34:09.676870108 CEST49757445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.681875944 CEST445497566.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:09.681957006 CEST49756445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.681996107 CEST445497576.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:09.682070971 CEST49757445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.682132959 CEST49757445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:09.686995983 CEST445497576.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:09.991489887 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:34:11.680619001 CEST49780445192.168.2.7185.127.160.210
                        Jul 25, 2024 21:34:11.685602903 CEST44549780185.127.160.210192.168.2.7
                        Jul 25, 2024 21:34:11.685687065 CEST49780445192.168.2.7185.127.160.210
                        Jul 25, 2024 21:34:11.685765028 CEST49780445192.168.2.7185.127.160.210
                        Jul 25, 2024 21:34:11.685976982 CEST49781445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.690768003 CEST44549781185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:11.690833092 CEST49781445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.690905094 CEST49781445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.691935062 CEST49782445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.693026066 CEST44549780185.127.160.210192.168.2.7
                        Jul 25, 2024 21:34:11.693078041 CEST49780445192.168.2.7185.127.160.210
                        Jul 25, 2024 21:34:11.696737051 CEST44549782185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:11.696819067 CEST49782445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.696858883 CEST49782445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.697649002 CEST44549781185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:11.697707891 CEST49781445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:11.701622963 CEST44549782185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:13.700067043 CEST49805445192.168.2.7119.225.62.88
                        Jul 25, 2024 21:34:13.705864906 CEST44549805119.225.62.88192.168.2.7
                        Jul 25, 2024 21:34:13.705955029 CEST49805445192.168.2.7119.225.62.88
                        Jul 25, 2024 21:34:13.706048012 CEST49805445192.168.2.7119.225.62.88
                        Jul 25, 2024 21:34:13.706347942 CEST49806445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.712241888 CEST44549805119.225.62.88192.168.2.7
                        Jul 25, 2024 21:34:13.712281942 CEST44549806119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:13.712352037 CEST49806445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.712439060 CEST49806445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.715259075 CEST49807445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.715457916 CEST44549805119.225.62.88192.168.2.7
                        Jul 25, 2024 21:34:13.715507030 CEST49805445192.168.2.7119.225.62.88
                        Jul 25, 2024 21:34:13.719609976 CEST44549806119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:13.720659971 CEST44549807119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:13.720726967 CEST49807445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.720794916 CEST49807445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.725439072 CEST44549806119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:13.725502014 CEST49806445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:13.728435040 CEST44549807119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:15.096786976 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:15.096818924 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:15.096918106 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:15.098731995 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:15.098750114 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:15.635937929 CEST49698443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:15.641002893 CEST44349698104.98.116.138192.168.2.7
                        Jul 25, 2024 21:34:15.704504013 CEST49829443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:15.704541922 CEST44349829104.98.116.138192.168.2.7
                        Jul 25, 2024 21:34:15.704642057 CEST49829443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:15.719294071 CEST49830445192.168.2.736.4.231.47
                        Jul 25, 2024 21:34:15.724232912 CEST4454983036.4.231.47192.168.2.7
                        Jul 25, 2024 21:34:15.726933956 CEST49830445192.168.2.736.4.231.47
                        Jul 25, 2024 21:34:15.727504969 CEST49830445192.168.2.736.4.231.47
                        Jul 25, 2024 21:34:15.727763891 CEST49831445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.728708029 CEST49829443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:15.728744030 CEST44349829104.98.116.138192.168.2.7
                        Jul 25, 2024 21:34:15.738717079 CEST4454983136.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:15.738804102 CEST49831445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.738949060 CEST49831445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.739522934 CEST4454983036.4.231.47192.168.2.7
                        Jul 25, 2024 21:34:15.740365028 CEST49832445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.748743057 CEST4454983236.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:15.749377966 CEST49832445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.749378920 CEST49832445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.753684998 CEST4454983136.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:15.756537914 CEST4454983236.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:15.767616034 CEST4454983036.4.231.47192.168.2.7
                        Jul 25, 2024 21:34:15.767709970 CEST49830445192.168.2.736.4.231.47
                        Jul 25, 2024 21:34:15.772726059 CEST4454983136.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:15.772824049 CEST49831445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:15.952775002 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:15.952864885 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:15.957145929 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:15.957163095 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:15.957479954 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:16.007117033 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:16.809045076 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:16.852543116 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078659058 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078680992 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078687906 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078700066 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078736067 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078785896 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:17.078833103 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.078851938 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:17.078888893 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:17.087836027 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.087933064 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:17.087941885 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:17.088025093 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:17.730487108 CEST49857445192.168.2.7199.180.31.91
                        Jul 25, 2024 21:34:17.932940960 CEST44549857199.180.31.91192.168.2.7
                        Jul 25, 2024 21:34:17.933098078 CEST49857445192.168.2.7199.180.31.91
                        Jul 25, 2024 21:34:17.981076002 CEST49857445192.168.2.7199.180.31.91
                        Jul 25, 2024 21:34:17.981408119 CEST49861445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:17.986215115 CEST44549857199.180.31.91192.168.2.7
                        Jul 25, 2024 21:34:17.986238956 CEST44549861199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:17.986367941 CEST49857445192.168.2.7199.180.31.91
                        Jul 25, 2024 21:34:17.986438990 CEST49861445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:17.986641884 CEST49861445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:17.992292881 CEST44549861199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:17.993933916 CEST49861445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:18.109442949 CEST49862445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:18.114274979 CEST44549862199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:18.114388943 CEST49862445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:18.118328094 CEST49862445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:18.123092890 CEST44549862199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:18.144620895 CEST49821443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:18.144659996 CEST4434982120.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:19.742168903 CEST49882445192.168.2.758.57.197.86
                        Jul 25, 2024 21:34:19.747318983 CEST4454988258.57.197.86192.168.2.7
                        Jul 25, 2024 21:34:19.747411966 CEST49882445192.168.2.758.57.197.86
                        Jul 25, 2024 21:34:19.747441053 CEST49882445192.168.2.758.57.197.86
                        Jul 25, 2024 21:34:19.747659922 CEST49883445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:19.752662897 CEST4454988358.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:19.752895117 CEST49883445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:19.752974987 CEST49883445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:19.753299952 CEST49884445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:19.758091927 CEST4454988458.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:19.758181095 CEST49884445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:19.758214951 CEST49884445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:19.759362936 CEST4454988258.57.197.86192.168.2.7
                        Jul 25, 2024 21:34:19.759377956 CEST4454988358.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:19.763112068 CEST4454988458.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:19.804990053 CEST44549862199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:19.805063963 CEST49862445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:19.805103064 CEST49862445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:19.805140972 CEST49862445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:19.809900045 CEST44549862199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:19.810092926 CEST44549862199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:19.868617058 CEST4454988258.57.197.86192.168.2.7
                        Jul 25, 2024 21:34:19.870044947 CEST49882445192.168.2.758.57.197.86
                        Jul 25, 2024 21:34:19.885164022 CEST4454988358.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:19.885363102 CEST49883445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:21.757917881 CEST49906445192.168.2.7152.246.44.232
                        Jul 25, 2024 21:34:21.763077974 CEST44549906152.246.44.232192.168.2.7
                        Jul 25, 2024 21:34:21.763194084 CEST49906445192.168.2.7152.246.44.232
                        Jul 25, 2024 21:34:21.763233900 CEST49906445192.168.2.7152.246.44.232
                        Jul 25, 2024 21:34:21.763326883 CEST49907445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.768374920 CEST44549907152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:21.768455029 CEST49907445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.768471956 CEST49907445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.768737078 CEST49908445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.769280910 CEST44549906152.246.44.232192.168.2.7
                        Jul 25, 2024 21:34:21.769351006 CEST49906445192.168.2.7152.246.44.232
                        Jul 25, 2024 21:34:21.773550034 CEST44549908152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:21.773617983 CEST49908445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.773649931 CEST49908445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.774135113 CEST44549907152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:21.774193048 CEST49907445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:21.779175043 CEST44549908152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:21.897855997 CEST49677443192.168.2.720.50.201.200
                        Jul 25, 2024 21:34:22.820127010 CEST49919445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:22.825028896 CEST44549919199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:22.825180054 CEST49919445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:22.825362921 CEST49919445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:22.830121994 CEST44549919199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:23.773487091 CEST49930445192.168.2.7185.124.94.222
                        Jul 25, 2024 21:34:23.778702021 CEST44549930185.124.94.222192.168.2.7
                        Jul 25, 2024 21:34:23.778794050 CEST49930445192.168.2.7185.124.94.222
                        Jul 25, 2024 21:34:23.778856039 CEST49930445192.168.2.7185.124.94.222
                        Jul 25, 2024 21:34:23.778955936 CEST49931445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.784313917 CEST44549931185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:23.784380913 CEST49931445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.784390926 CEST49931445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.784650087 CEST49932445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.785125971 CEST44549930185.124.94.222192.168.2.7
                        Jul 25, 2024 21:34:23.785181999 CEST49930445192.168.2.7185.124.94.222
                        Jul 25, 2024 21:34:23.789597034 CEST44549932185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:23.789659977 CEST49932445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.789685011 CEST49932445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.790986061 CEST44549931185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:23.791034937 CEST49931445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:23.794754982 CEST44549932185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:24.443569899 CEST44549919199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:24.443691969 CEST49919445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:24.443712950 CEST49919445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:24.443751097 CEST49919445192.168.2.7199.180.31.1
                        Jul 25, 2024 21:34:24.448662996 CEST44549919199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:24.448687077 CEST44549919199.180.31.1192.168.2.7
                        Jul 25, 2024 21:34:24.507422924 CEST49940445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.515492916 CEST44549940199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:24.515602112 CEST49940445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.515672922 CEST49940445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.516030073 CEST49941445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.521862984 CEST44549941199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:24.521929026 CEST49941445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.521982908 CEST49941445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.523327112 CEST44549940199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:24.523386002 CEST49940445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:24.529334068 CEST44549941199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:25.789309978 CEST49956445192.168.2.7202.230.132.72
                        Jul 25, 2024 21:34:25.794668913 CEST44549956202.230.132.72192.168.2.7
                        Jul 25, 2024 21:34:25.794833899 CEST49956445192.168.2.7202.230.132.72
                        Jul 25, 2024 21:34:25.794857979 CEST49956445192.168.2.7202.230.132.72
                        Jul 25, 2024 21:34:25.795078993 CEST49957445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.799927950 CEST44549957202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:25.800004005 CEST49957445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.800004005 CEST49957445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.800271988 CEST49958445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.801620007 CEST44549956202.230.132.72192.168.2.7
                        Jul 25, 2024 21:34:25.801690102 CEST49956445192.168.2.7202.230.132.72
                        Jul 25, 2024 21:34:25.805327892 CEST44549958202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:25.805402994 CEST49958445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.805428028 CEST49958445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.806658983 CEST44549957202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:25.806718111 CEST49957445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:25.810492992 CEST44549958202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:27.068595886 CEST4454970764.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:27.068809032 CEST49707445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:27.068809032 CEST49707445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:27.068873882 CEST49707445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:27.073745012 CEST4454970764.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:27.073810101 CEST4454970764.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:27.804749012 CEST49981445192.168.2.769.235.55.242
                        Jul 25, 2024 21:34:27.814795971 CEST4454998169.235.55.242192.168.2.7
                        Jul 25, 2024 21:34:27.814913034 CEST49981445192.168.2.769.235.55.242
                        Jul 25, 2024 21:34:27.814960003 CEST49981445192.168.2.769.235.55.242
                        Jul 25, 2024 21:34:27.815210104 CEST49982445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.820234060 CEST4454998269.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:27.820318937 CEST49982445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.820348024 CEST49982445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.820650101 CEST49983445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.822278023 CEST4454998169.235.55.242192.168.2.7
                        Jul 25, 2024 21:34:27.822356939 CEST49981445192.168.2.769.235.55.242
                        Jul 25, 2024 21:34:27.825479984 CEST4454998369.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:27.825542927 CEST49983445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.825563908 CEST49983445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.826822996 CEST4454998269.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:27.826870918 CEST49982445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:27.830641985 CEST4454998369.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:29.074650049 CEST4454973210.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:29.074814081 CEST49732445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:29.074814081 CEST49732445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:29.074870110 CEST49732445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:29.081199884 CEST4454973210.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:29.081217051 CEST4454973210.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:29.824479103 CEST50004445192.168.2.7199.207.38.47
                        Jul 25, 2024 21:34:29.834564924 CEST44550004199.207.38.47192.168.2.7
                        Jul 25, 2024 21:34:29.834640026 CEST50004445192.168.2.7199.207.38.47
                        Jul 25, 2024 21:34:29.836991072 CEST50004445192.168.2.7199.207.38.47
                        Jul 25, 2024 21:34:29.837178946 CEST50005445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.842730999 CEST44550005199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:29.842808962 CEST50005445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.843044043 CEST44550004199.207.38.47192.168.2.7
                        Jul 25, 2024 21:34:29.843101025 CEST50004445192.168.2.7199.207.38.47
                        Jul 25, 2024 21:34:29.845139980 CEST50005445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.854166031 CEST44550005199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:29.862430096 CEST44550005199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:29.862505913 CEST50005445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.863843918 CEST50006445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.869477034 CEST44550006199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:29.869539022 CEST50006445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.870179892 CEST50006445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:29.875475883 CEST44550006199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:30.069924116 CEST50010445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:30.075943947 CEST4455001064.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:30.076040030 CEST50010445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:30.078803062 CEST50010445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:30.083893061 CEST4455001064.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:31.036318064 CEST445497576.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:31.036422014 CEST49757445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:31.037178993 CEST49757445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:31.037455082 CEST49757445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:31.043910980 CEST445497576.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:31.043967009 CEST445497576.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:31.835969925 CEST50011445192.168.2.7210.44.60.232
                        Jul 25, 2024 21:34:31.841244936 CEST44550011210.44.60.232192.168.2.7
                        Jul 25, 2024 21:34:31.841367960 CEST50011445192.168.2.7210.44.60.232
                        Jul 25, 2024 21:34:31.841367960 CEST50011445192.168.2.7210.44.60.232
                        Jul 25, 2024 21:34:31.841495991 CEST50012445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.846411943 CEST44550012210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:31.846502066 CEST50012445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.846535921 CEST50012445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.846867085 CEST50013445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.847265005 CEST44550011210.44.60.232192.168.2.7
                        Jul 25, 2024 21:34:31.847335100 CEST50011445192.168.2.7210.44.60.232
                        Jul 25, 2024 21:34:31.852139950 CEST44550012210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:31.852431059 CEST44550013210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:31.852519035 CEST50013445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.852521896 CEST50012445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.852552891 CEST50013445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:31.857458115 CEST44550013210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:32.085628033 CEST50014445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:32.090688944 CEST4455001410.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:32.090823889 CEST50014445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:32.090909004 CEST50014445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:32.096251965 CEST4455001410.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:33.067884922 CEST44549782185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:33.068044901 CEST49782445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:33.068188906 CEST49782445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:33.068319082 CEST49782445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:33.073153973 CEST44549782185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:33.073683977 CEST44549782185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:33.851540089 CEST50015445192.168.2.7188.219.99.197
                        Jul 25, 2024 21:34:33.856724977 CEST44550015188.219.99.197192.168.2.7
                        Jul 25, 2024 21:34:33.856838942 CEST50015445192.168.2.7188.219.99.197
                        Jul 25, 2024 21:34:33.856858969 CEST50015445192.168.2.7188.219.99.197
                        Jul 25, 2024 21:34:33.856981993 CEST50016445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.861903906 CEST44550016188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:33.862004042 CEST50016445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.862004042 CEST50016445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.862246037 CEST50017445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.863850117 CEST44550015188.219.99.197192.168.2.7
                        Jul 25, 2024 21:34:33.864577055 CEST44550015188.219.99.197192.168.2.7
                        Jul 25, 2024 21:34:33.864643097 CEST50015445192.168.2.7188.219.99.197
                        Jul 25, 2024 21:34:33.868063927 CEST44550017188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:33.868139029 CEST50017445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.868160963 CEST50017445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.868974924 CEST44550016188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:33.869043112 CEST50016445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:33.873260975 CEST44550017188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:34.038999081 CEST50018445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:34.044542074 CEST445500186.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:34.044723034 CEST50018445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:34.044893026 CEST50018445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:34.050143003 CEST445500186.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:35.117918968 CEST44549807119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:35.118027925 CEST49807445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:35.118108034 CEST49807445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:35.118206024 CEST49807445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:35.123080969 CEST44549807119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:35.123111010 CEST44549807119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:35.650484085 CEST44550017188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:35.650696993 CEST50017445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:35.650696993 CEST50017445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:35.650732994 CEST50017445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:35.655555964 CEST44550017188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:35.656586885 CEST44550017188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:35.867202997 CEST50019445192.168.2.7100.100.254.107
                        Jul 25, 2024 21:34:35.872312069 CEST44550019100.100.254.107192.168.2.7
                        Jul 25, 2024 21:34:35.872448921 CEST50019445192.168.2.7100.100.254.107
                        Jul 25, 2024 21:34:35.872539997 CEST50019445192.168.2.7100.100.254.107
                        Jul 25, 2024 21:34:35.872813940 CEST50020445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.883085012 CEST44550020100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:35.883177996 CEST50020445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.883214951 CEST50020445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.883414984 CEST44550019100.100.254.107192.168.2.7
                        Jul 25, 2024 21:34:35.883519888 CEST50021445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.884031057 CEST44550019100.100.254.107192.168.2.7
                        Jul 25, 2024 21:34:35.884098053 CEST50019445192.168.2.7100.100.254.107
                        Jul 25, 2024 21:34:35.891547918 CEST44550021100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:35.891657114 CEST50021445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.891700029 CEST50021445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.893104076 CEST44550020100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:35.893167019 CEST50020445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:35.896493912 CEST44550021100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:36.070420027 CEST50022445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:36.322211027 CEST44550022185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:36.322390079 CEST50022445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:36.322463036 CEST50022445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:36.334688902 CEST44550022185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:37.170016050 CEST4454983236.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:37.170149088 CEST49832445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:37.170340061 CEST49832445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:37.170399904 CEST49832445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:37.186709881 CEST4454983236.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:37.186768055 CEST4454983236.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:37.882663012 CEST50023445192.168.2.794.16.11.61
                        Jul 25, 2024 21:34:37.887876987 CEST4455002394.16.11.61192.168.2.7
                        Jul 25, 2024 21:34:37.887967110 CEST50023445192.168.2.794.16.11.61
                        Jul 25, 2024 21:34:37.888016939 CEST50023445192.168.2.794.16.11.61
                        Jul 25, 2024 21:34:37.888205051 CEST50024445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.893490076 CEST4455002494.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:37.893569946 CEST50024445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.893656015 CEST50024445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.893970966 CEST50025445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.894269943 CEST4455002394.16.11.61192.168.2.7
                        Jul 25, 2024 21:34:37.894325018 CEST50023445192.168.2.794.16.11.61
                        Jul 25, 2024 21:34:37.898895979 CEST4455002594.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:37.898969889 CEST50025445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.899003983 CEST50025445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.899254084 CEST4455002494.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:37.899306059 CEST50024445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:37.904090881 CEST4455002594.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:38.132724047 CEST50026445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:38.137912989 CEST44550026119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:38.138046980 CEST50026445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:38.138125896 CEST50026445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:38.142993927 CEST44550026119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:38.663676977 CEST50027445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:38.668776035 CEST44550027188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:38.668865919 CEST50027445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:38.668930054 CEST50027445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:38.673810005 CEST44550027188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:39.898593903 CEST50028445192.168.2.716.68.196.149
                        Jul 25, 2024 21:34:39.904087067 CEST4455002816.68.196.149192.168.2.7
                        Jul 25, 2024 21:34:39.904298067 CEST50028445192.168.2.716.68.196.149
                        Jul 25, 2024 21:34:39.904361010 CEST50028445192.168.2.716.68.196.149
                        Jul 25, 2024 21:34:39.904937029 CEST50029445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.913279057 CEST4455002916.68.196.1192.168.2.7
                        Jul 25, 2024 21:34:39.913392067 CEST4455002816.68.196.149192.168.2.7
                        Jul 25, 2024 21:34:39.913422108 CEST50029445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.913523912 CEST50028445192.168.2.716.68.196.149
                        Jul 25, 2024 21:34:39.913578987 CEST50029445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.913918018 CEST50030445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.919164896 CEST4455003016.68.196.1192.168.2.7
                        Jul 25, 2024 21:34:39.919300079 CEST50030445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.919300079 CEST50030445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.919358015 CEST4455002916.68.196.1192.168.2.7
                        Jul 25, 2024 21:34:39.922564030 CEST4455002916.68.196.1192.168.2.7
                        Jul 25, 2024 21:34:39.922744036 CEST50029445192.168.2.716.68.196.1
                        Jul 25, 2024 21:34:39.924967051 CEST4455003016.68.196.1192.168.2.7
                        Jul 25, 2024 21:34:40.179709911 CEST50031445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:40.185312986 CEST4455003136.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:40.185569048 CEST50031445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:40.185925007 CEST50031445192.168.2.736.4.231.1
                        Jul 25, 2024 21:34:40.191277981 CEST4455003136.4.231.1192.168.2.7
                        Jul 25, 2024 21:34:40.492229939 CEST44550027188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:40.492343903 CEST50027445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:40.492384911 CEST50027445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:40.492418051 CEST50027445192.168.2.7188.219.99.1
                        Jul 25, 2024 21:34:40.497278929 CEST44550027188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:40.497780085 CEST44550027188.219.99.1192.168.2.7
                        Jul 25, 2024 21:34:40.554586887 CEST50032445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.573379040 CEST44550032188.219.99.2192.168.2.7
                        Jul 25, 2024 21:34:40.573513985 CEST50032445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.573513985 CEST50032445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.574018002 CEST50033445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.580713987 CEST44550033188.219.99.2192.168.2.7
                        Jul 25, 2024 21:34:40.580790043 CEST50033445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.580874920 CEST50033445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.583208084 CEST44550032188.219.99.2192.168.2.7
                        Jul 25, 2024 21:34:40.583267927 CEST50032445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:34:40.585767984 CEST44550033188.219.99.2192.168.2.7
                        Jul 25, 2024 21:34:41.245109081 CEST4454988458.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:41.245223045 CEST49884445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:41.245223045 CEST49884445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:41.245413065 CEST49884445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:41.250073910 CEST4454988458.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:41.250314951 CEST4454988458.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:41.773601055 CEST50034445192.168.2.790.64.160.42
                        Jul 25, 2024 21:34:41.779320002 CEST4455003490.64.160.42192.168.2.7
                        Jul 25, 2024 21:34:41.779445887 CEST50034445192.168.2.790.64.160.42
                        Jul 25, 2024 21:34:41.779481888 CEST50034445192.168.2.790.64.160.42
                        Jul 25, 2024 21:34:41.779720068 CEST50035445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.785001993 CEST4455003590.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:41.785090923 CEST50035445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.785128117 CEST50035445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.785466909 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.786186934 CEST4455003490.64.160.42192.168.2.7
                        Jul 25, 2024 21:34:41.786303043 CEST50034445192.168.2.790.64.160.42
                        Jul 25, 2024 21:34:41.790656090 CEST4455003690.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:41.790741920 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.790807009 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.791301966 CEST4455003590.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:41.792095900 CEST4455003590.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:41.792152882 CEST50035445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:41.796293974 CEST4455003690.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:43.154119968 CEST44549908152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:43.154293060 CEST49908445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:43.154340982 CEST49908445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:43.154393911 CEST49908445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:43.159307957 CEST44549908152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:43.159332037 CEST44549908152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:43.523783922 CEST50037445192.168.2.74.84.89.125
                        Jul 25, 2024 21:34:43.554883957 CEST445500374.84.89.125192.168.2.7
                        Jul 25, 2024 21:34:43.555130005 CEST50037445192.168.2.74.84.89.125
                        Jul 25, 2024 21:34:43.573055983 CEST50037445192.168.2.74.84.89.125
                        Jul 25, 2024 21:34:43.573273897 CEST50038445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.579821110 CEST445500384.84.89.1192.168.2.7
                        Jul 25, 2024 21:34:43.579981089 CEST50038445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.579981089 CEST50038445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.580328941 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.584945917 CEST445500374.84.89.125192.168.2.7
                        Jul 25, 2024 21:34:43.585342884 CEST50037445192.168.2.74.84.89.125
                        Jul 25, 2024 21:34:43.595386982 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:34:43.595426083 CEST445500384.84.89.1192.168.2.7
                        Jul 25, 2024 21:34:43.595518112 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.598095894 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.599647999 CEST445500384.84.89.1192.168.2.7
                        Jul 25, 2024 21:34:43.599715948 CEST50038445192.168.2.74.84.89.1
                        Jul 25, 2024 21:34:43.603722095 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:34:43.860816956 CEST4455003690.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:43.860985041 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:43.861939907 CEST4455003690.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:43.861996889 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:43.862453938 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:43.862515926 CEST50036445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:43.867297888 CEST4455003690.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:43.867532015 CEST4455003690.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:44.258150101 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:44.263456106 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:44.263607979 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:44.263652086 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:34:44.268946886 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:34:45.164073944 CEST50041445192.168.2.795.210.118.170
                        Jul 25, 2024 21:34:45.169315100 CEST4455004195.210.118.170192.168.2.7
                        Jul 25, 2024 21:34:45.169420004 CEST50041445192.168.2.795.210.118.170
                        Jul 25, 2024 21:34:45.169441938 CEST50041445192.168.2.795.210.118.170
                        Jul 25, 2024 21:34:45.169537067 CEST50042445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.176145077 CEST4455004295.210.118.1192.168.2.7
                        Jul 25, 2024 21:34:45.176249981 CEST50042445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.176286936 CEST50042445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.176640034 CEST50043445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.176722050 CEST4455004195.210.118.170192.168.2.7
                        Jul 25, 2024 21:34:45.176779985 CEST50041445192.168.2.795.210.118.170
                        Jul 25, 2024 21:34:45.184185982 CEST4455004395.210.118.1192.168.2.7
                        Jul 25, 2024 21:34:45.184252977 CEST50043445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.184287071 CEST50043445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.189451933 CEST4455004295.210.118.1192.168.2.7
                        Jul 25, 2024 21:34:45.189503908 CEST50042445192.168.2.795.210.118.1
                        Jul 25, 2024 21:34:45.189857006 CEST4455004395.210.118.1192.168.2.7
                        Jul 25, 2024 21:34:45.197597027 CEST44549932185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:45.197654963 CEST49932445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:45.197685003 CEST49932445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:45.197724104 CEST49932445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:45.204170942 CEST44549932185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:45.204240084 CEST44549932185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:45.897361994 CEST44549941199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:45.897722006 CEST49941445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:45.897722006 CEST49941445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:45.897768974 CEST49941445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:45.902565956 CEST44549941199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:45.902924061 CEST44549941199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:46.164098978 CEST50044445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:46.169275999 CEST44550044152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:46.169404984 CEST50044445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:46.174674034 CEST50044445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:34:46.180095911 CEST44550044152.246.44.1192.168.2.7
                        Jul 25, 2024 21:34:46.695390940 CEST50045445192.168.2.7136.185.8.192
                        Jul 25, 2024 21:34:46.700402975 CEST44550045136.185.8.192192.168.2.7
                        Jul 25, 2024 21:34:46.700504065 CEST50045445192.168.2.7136.185.8.192
                        Jul 25, 2024 21:34:46.700519085 CEST50045445192.168.2.7136.185.8.192
                        Jul 25, 2024 21:34:46.700716972 CEST50046445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.707416058 CEST44550045136.185.8.192192.168.2.7
                        Jul 25, 2024 21:34:46.707478046 CEST44550046136.185.8.1192.168.2.7
                        Jul 25, 2024 21:34:46.707567930 CEST50046445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.707660913 CEST50046445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.707986116 CEST50047445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.709034920 CEST44550045136.185.8.192192.168.2.7
                        Jul 25, 2024 21:34:46.709106922 CEST50045445192.168.2.7136.185.8.192
                        Jul 25, 2024 21:34:46.714940071 CEST44550047136.185.8.1192.168.2.7
                        Jul 25, 2024 21:34:46.715039015 CEST50047445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.715070963 CEST50047445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.715576887 CEST44550046136.185.8.1192.168.2.7
                        Jul 25, 2024 21:34:46.715640068 CEST50046445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:34:46.720114946 CEST44550047136.185.8.1192.168.2.7
                        Jul 25, 2024 21:34:46.867008924 CEST50048445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:46.872838020 CEST4455004890.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:46.872972012 CEST50048445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:46.873019934 CEST50048445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:46.878456116 CEST4455004890.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:47.199251890 CEST44549958202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:47.199331999 CEST49958445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:47.199388027 CEST49958445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:47.199410915 CEST49958445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:47.204242945 CEST44549958202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:47.204265118 CEST44549958202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:48.119435072 CEST50049445192.168.2.768.75.152.100
                        Jul 25, 2024 21:34:48.124749899 CEST4455004968.75.152.100192.168.2.7
                        Jul 25, 2024 21:34:48.124859095 CEST50049445192.168.2.768.75.152.100
                        Jul 25, 2024 21:34:48.124979973 CEST50049445192.168.2.768.75.152.100
                        Jul 25, 2024 21:34:48.125163078 CEST50050445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.130201101 CEST4455005068.75.152.1192.168.2.7
                        Jul 25, 2024 21:34:48.130276918 CEST50050445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.131400108 CEST4455004968.75.152.100192.168.2.7
                        Jul 25, 2024 21:34:48.131757021 CEST4455004968.75.152.100192.168.2.7
                        Jul 25, 2024 21:34:48.131808996 CEST50049445192.168.2.768.75.152.100
                        Jul 25, 2024 21:34:48.134413958 CEST50050445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.139662981 CEST4455005068.75.152.1192.168.2.7
                        Jul 25, 2024 21:34:48.139740944 CEST50050445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.177685976 CEST50051445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.182871103 CEST4455005168.75.152.1192.168.2.7
                        Jul 25, 2024 21:34:48.183001995 CEST50051445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.184791088 CEST50051445192.168.2.768.75.152.1
                        Jul 25, 2024 21:34:48.189721107 CEST4455005168.75.152.1192.168.2.7
                        Jul 25, 2024 21:34:48.273468018 CEST50052445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:48.279035091 CEST44550052185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:48.279131889 CEST50052445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:48.279165983 CEST50052445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:34:48.284981966 CEST44550052185.124.94.1192.168.2.7
                        Jul 25, 2024 21:34:48.610488892 CEST4455004890.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:48.610577106 CEST50048445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:48.610622883 CEST50048445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:48.610666037 CEST50048445192.168.2.790.64.160.1
                        Jul 25, 2024 21:34:48.615560055 CEST4455004890.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:48.615602970 CEST4455004890.64.160.1192.168.2.7
                        Jul 25, 2024 21:34:48.663779974 CEST50053445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.668634892 CEST4455005390.64.160.2192.168.2.7
                        Jul 25, 2024 21:34:48.668725014 CEST50053445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.668740988 CEST50053445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.669048071 CEST50054445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.674199104 CEST4455005490.64.160.2192.168.2.7
                        Jul 25, 2024 21:34:48.674263000 CEST50054445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.674273014 CEST50054445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.674877882 CEST4455005390.64.160.2192.168.2.7
                        Jul 25, 2024 21:34:48.674921989 CEST50053445192.168.2.790.64.160.2
                        Jul 25, 2024 21:34:48.679133892 CEST4455005490.64.160.2192.168.2.7
                        Jul 25, 2024 21:34:48.898260117 CEST50055445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:48.907736063 CEST44550055199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:48.907871962 CEST50055445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:48.907912016 CEST50055445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:34:48.912959099 CEST44550055199.180.31.2192.168.2.7
                        Jul 25, 2024 21:34:49.228432894 CEST4454998369.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:49.228593111 CEST49983445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:49.228626966 CEST49983445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:49.228650093 CEST49983445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:49.233695030 CEST4454998369.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:49.233727932 CEST4454998369.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:49.445312023 CEST50056445192.168.2.780.67.170.143
                        Jul 25, 2024 21:34:49.450973988 CEST4455005680.67.170.143192.168.2.7
                        Jul 25, 2024 21:34:49.451124907 CEST50056445192.168.2.780.67.170.143
                        Jul 25, 2024 21:34:49.451154947 CEST50056445192.168.2.780.67.170.143
                        Jul 25, 2024 21:34:49.451263905 CEST50057445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.458817005 CEST4455005780.67.170.1192.168.2.7
                        Jul 25, 2024 21:34:49.458905935 CEST50057445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.458940029 CEST50057445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.459234953 CEST50058445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.459547997 CEST4455005680.67.170.143192.168.2.7
                        Jul 25, 2024 21:34:49.461355925 CEST4455005680.67.170.143192.168.2.7
                        Jul 25, 2024 21:34:49.461425066 CEST50056445192.168.2.780.67.170.143
                        Jul 25, 2024 21:34:49.464241028 CEST4455005880.67.170.1192.168.2.7
                        Jul 25, 2024 21:34:49.464323044 CEST50058445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.464380026 CEST50058445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.464833021 CEST4455005780.67.170.1192.168.2.7
                        Jul 25, 2024 21:34:49.464881897 CEST50057445192.168.2.780.67.170.1
                        Jul 25, 2024 21:34:49.469329119 CEST4455005880.67.170.1192.168.2.7
                        Jul 25, 2024 21:34:50.214639902 CEST50059445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:50.219563961 CEST44550059202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:50.219635963 CEST50059445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:50.219665051 CEST50059445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:34:50.224479914 CEST44550059202.230.132.1192.168.2.7
                        Jul 25, 2024 21:34:50.683052063 CEST50060445192.168.2.7161.221.47.44
                        Jul 25, 2024 21:34:50.688189030 CEST44550060161.221.47.44192.168.2.7
                        Jul 25, 2024 21:34:50.688503981 CEST50060445192.168.2.7161.221.47.44
                        Jul 25, 2024 21:34:50.701298952 CEST50060445192.168.2.7161.221.47.44
                        Jul 25, 2024 21:34:50.701517105 CEST50061445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.706438065 CEST44550061161.221.47.1192.168.2.7
                        Jul 25, 2024 21:34:50.706541061 CEST50061445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.706577063 CEST50061445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.706625938 CEST44550060161.221.47.44192.168.2.7
                        Jul 25, 2024 21:34:50.706758976 CEST50060445192.168.2.7161.221.47.44
                        Jul 25, 2024 21:34:50.706944942 CEST50062445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.712419033 CEST44550061161.221.47.1192.168.2.7
                        Jul 25, 2024 21:34:50.712507010 CEST50061445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.712691069 CEST44550062161.221.47.1192.168.2.7
                        Jul 25, 2024 21:34:50.712757111 CEST50062445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.720829010 CEST50062445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:34:50.725806952 CEST44550062161.221.47.1192.168.2.7
                        Jul 25, 2024 21:34:51.279762030 CEST44550006199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:51.279876947 CEST50006445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:51.280057907 CEST50006445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:51.280057907 CEST50006445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:51.285207987 CEST44550006199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:51.285578012 CEST44550006199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:51.457420111 CEST4455001064.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:51.457555056 CEST50010445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:51.457668066 CEST50010445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:51.457668066 CEST50010445192.168.2.764.16.93.1
                        Jul 25, 2024 21:34:51.462675095 CEST4455001064.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:51.463017941 CEST4455001064.16.93.1192.168.2.7
                        Jul 25, 2024 21:34:51.523251057 CEST50063445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.528362036 CEST4455006364.16.93.2192.168.2.7
                        Jul 25, 2024 21:34:51.528472900 CEST50063445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.528516054 CEST50063445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.528918982 CEST50064445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.534387112 CEST4455006464.16.93.2192.168.2.7
                        Jul 25, 2024 21:34:51.534486055 CEST50064445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.534486055 CEST50064445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.534835100 CEST4455006364.16.93.2192.168.2.7
                        Jul 25, 2024 21:34:51.534892082 CEST50063445192.168.2.764.16.93.2
                        Jul 25, 2024 21:34:51.539628983 CEST4455006464.16.93.2192.168.2.7
                        Jul 25, 2024 21:34:51.836136103 CEST50065445192.168.2.799.44.247.176
                        Jul 25, 2024 21:34:51.841314077 CEST4455006599.44.247.176192.168.2.7
                        Jul 25, 2024 21:34:51.841545105 CEST50065445192.168.2.799.44.247.176
                        Jul 25, 2024 21:34:51.841661930 CEST50065445192.168.2.799.44.247.176
                        Jul 25, 2024 21:34:51.841661930 CEST50066445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.849049091 CEST4455006699.44.247.1192.168.2.7
                        Jul 25, 2024 21:34:51.849237919 CEST50066445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.849292040 CEST50066445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.850229025 CEST50067445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.855271101 CEST4455006799.44.247.1192.168.2.7
                        Jul 25, 2024 21:34:51.855453968 CEST50067445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.855532885 CEST50067445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.855833054 CEST4455006699.44.247.1192.168.2.7
                        Jul 25, 2024 21:34:51.856093884 CEST4455006599.44.247.176192.168.2.7
                        Jul 25, 2024 21:34:51.857984066 CEST4455006599.44.247.176192.168.2.7
                        Jul 25, 2024 21:34:51.858078957 CEST50065445192.168.2.799.44.247.176
                        Jul 25, 2024 21:34:51.859045029 CEST4455006699.44.247.1192.168.2.7
                        Jul 25, 2024 21:34:51.859133959 CEST50066445192.168.2.799.44.247.1
                        Jul 25, 2024 21:34:51.860641003 CEST4455006799.44.247.1192.168.2.7
                        Jul 25, 2024 21:34:52.242039919 CEST50068445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:52.250739098 CEST4455006869.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:52.250878096 CEST50068445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:52.250925064 CEST50068445192.168.2.769.235.55.1
                        Jul 25, 2024 21:34:52.256728888 CEST4455006869.235.55.1192.168.2.7
                        Jul 25, 2024 21:34:52.914155006 CEST50069445192.168.2.795.43.108.164
                        Jul 25, 2024 21:34:52.919502974 CEST4455006995.43.108.164192.168.2.7
                        Jul 25, 2024 21:34:52.919590950 CEST50069445192.168.2.795.43.108.164
                        Jul 25, 2024 21:34:52.919678926 CEST50069445192.168.2.795.43.108.164
                        Jul 25, 2024 21:34:52.919847012 CEST50070445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.924678087 CEST4455007095.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:52.924740076 CEST50070445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.924777031 CEST50070445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.925052881 CEST50071445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.925218105 CEST4455006995.43.108.164192.168.2.7
                        Jul 25, 2024 21:34:52.925277948 CEST50069445192.168.2.795.43.108.164
                        Jul 25, 2024 21:34:52.930192947 CEST4455007195.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:52.930202961 CEST4455007095.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:52.930260897 CEST50070445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.930282116 CEST50071445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.930331945 CEST50071445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:52.935244083 CEST4455007195.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:53.245033979 CEST44550013210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:53.245170116 CEST50013445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:53.245170116 CEST50013445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:53.245266914 CEST50013445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:53.250284910 CEST44550013210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:53.250384092 CEST44550013210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:53.463709116 CEST4455001410.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:53.463864088 CEST50014445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:53.463922024 CEST50014445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:53.463983059 CEST50014445192.168.2.710.54.96.1
                        Jul 25, 2024 21:34:53.468900919 CEST4455001410.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:53.468931913 CEST4455001410.54.96.1192.168.2.7
                        Jul 25, 2024 21:34:53.523550034 CEST50072445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.529083014 CEST4455007210.54.96.2192.168.2.7
                        Jul 25, 2024 21:34:53.529206991 CEST50072445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.529234886 CEST50072445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.529639959 CEST50073445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.534549952 CEST4455007310.54.96.2192.168.2.7
                        Jul 25, 2024 21:34:53.534622908 CEST50073445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.534660101 CEST50073445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.535367012 CEST4455007210.54.96.2192.168.2.7
                        Jul 25, 2024 21:34:53.535732031 CEST4455007210.54.96.2192.168.2.7
                        Jul 25, 2024 21:34:53.535788059 CEST50072445192.168.2.710.54.96.2
                        Jul 25, 2024 21:34:53.543585062 CEST4455007310.54.96.2192.168.2.7
                        Jul 25, 2024 21:34:53.929807901 CEST50074445192.168.2.7162.84.231.192
                        Jul 25, 2024 21:34:53.938508034 CEST44550074162.84.231.192192.168.2.7
                        Jul 25, 2024 21:34:53.938735008 CEST50074445192.168.2.7162.84.231.192
                        Jul 25, 2024 21:34:53.938807011 CEST50074445192.168.2.7162.84.231.192
                        Jul 25, 2024 21:34:53.938985109 CEST50075445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.945518017 CEST44550075162.84.231.1192.168.2.7
                        Jul 25, 2024 21:34:53.945612907 CEST50075445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.945647955 CEST50075445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.945878029 CEST44550074162.84.231.192192.168.2.7
                        Jul 25, 2024 21:34:53.945950031 CEST50074445192.168.2.7162.84.231.192
                        Jul 25, 2024 21:34:53.946021080 CEST50076445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.952111959 CEST44550076162.84.231.1192.168.2.7
                        Jul 25, 2024 21:34:53.952143908 CEST44550075162.84.231.1192.168.2.7
                        Jul 25, 2024 21:34:53.952172041 CEST44550075162.84.231.1192.168.2.7
                        Jul 25, 2024 21:34:53.952205896 CEST50076445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.952233076 CEST50075445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.952279091 CEST50076445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:34:53.958549023 CEST44550076162.84.231.1192.168.2.7
                        Jul 25, 2024 21:34:54.288997889 CEST50077445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:54.299882889 CEST44550077199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:54.300024986 CEST50077445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:54.300024986 CEST50077445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:34:54.306215048 CEST44550077199.207.38.1192.168.2.7
                        Jul 25, 2024 21:34:54.653789997 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:54.653858900 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:54.654129982 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:54.654377937 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:54.654412031 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:54.729368925 CEST4455007195.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:54.729628086 CEST50071445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:54.729628086 CEST50071445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:54.729629040 CEST50071445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:54.734719992 CEST4455007195.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:54.734778881 CEST4455007195.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:54.867645979 CEST50079445192.168.2.72.251.193.160
                        Jul 25, 2024 21:34:54.873378992 CEST445500792.251.193.160192.168.2.7
                        Jul 25, 2024 21:34:54.873660088 CEST50079445192.168.2.72.251.193.160
                        Jul 25, 2024 21:34:54.873735905 CEST50079445192.168.2.72.251.193.160
                        Jul 25, 2024 21:34:54.874026060 CEST50080445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.879009962 CEST445500802.251.193.1192.168.2.7
                        Jul 25, 2024 21:34:54.879113913 CEST50080445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.879237890 CEST50080445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.879570961 CEST445500792.251.193.160192.168.2.7
                        Jul 25, 2024 21:34:54.879755020 CEST50081445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.879856110 CEST445500792.251.193.160192.168.2.7
                        Jul 25, 2024 21:34:54.879936934 CEST50079445192.168.2.72.251.193.160
                        Jul 25, 2024 21:34:54.884691954 CEST445500802.251.193.1192.168.2.7
                        Jul 25, 2024 21:34:54.884744883 CEST445500812.251.193.1192.168.2.7
                        Jul 25, 2024 21:34:54.884803057 CEST50080445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.884921074 CEST50081445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.884939909 CEST50081445192.168.2.72.251.193.1
                        Jul 25, 2024 21:34:54.889885902 CEST445500812.251.193.1192.168.2.7
                        Jul 25, 2024 21:34:55.413064957 CEST445500186.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:55.413141012 CEST50018445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:55.413178921 CEST50018445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:55.413238049 CEST50018445192.168.2.76.118.192.1
                        Jul 25, 2024 21:34:55.418927908 CEST445500186.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:55.419308901 CEST445500186.118.192.1192.168.2.7
                        Jul 25, 2024 21:34:55.476367950 CEST50082445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.481515884 CEST445500826.118.192.2192.168.2.7
                        Jul 25, 2024 21:34:55.481616974 CEST50082445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.481678963 CEST50082445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.482009888 CEST50083445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.487287998 CEST445500826.118.192.2192.168.2.7
                        Jul 25, 2024 21:34:55.487333059 CEST445500836.118.192.2192.168.2.7
                        Jul 25, 2024 21:34:55.487353086 CEST50082445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.487390995 CEST50083445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.487432003 CEST50083445192.168.2.76.118.192.2
                        Jul 25, 2024 21:34:55.492948055 CEST445500836.118.192.2192.168.2.7
                        Jul 25, 2024 21:34:55.561294079 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.561429977 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.564958096 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.564974070 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.565217018 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.571245909 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.612540960 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.742252111 CEST50084445192.168.2.7210.211.15.239
                        Jul 25, 2024 21:34:55.754357100 CEST44550084210.211.15.239192.168.2.7
                        Jul 25, 2024 21:34:55.754487991 CEST50084445192.168.2.7210.211.15.239
                        Jul 25, 2024 21:34:55.754515886 CEST50084445192.168.2.7210.211.15.239
                        Jul 25, 2024 21:34:55.754724026 CEST50085445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.760749102 CEST44550085210.211.15.1192.168.2.7
                        Jul 25, 2024 21:34:55.760854959 CEST50085445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.761143923 CEST50085445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.761143923 CEST50086445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.763034105 CEST44550084210.211.15.239192.168.2.7
                        Jul 25, 2024 21:34:55.763091087 CEST50084445192.168.2.7210.211.15.239
                        Jul 25, 2024 21:34:55.766340971 CEST44550086210.211.15.1192.168.2.7
                        Jul 25, 2024 21:34:55.766457081 CEST50086445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.766504049 CEST50086445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.767401934 CEST44550085210.211.15.1192.168.2.7
                        Jul 25, 2024 21:34:55.775131941 CEST44550086210.211.15.1192.168.2.7
                        Jul 25, 2024 21:34:55.797863007 CEST44550085210.211.15.1192.168.2.7
                        Jul 25, 2024 21:34:55.797992945 CEST50085445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:34:55.908307076 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.908351898 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.908369064 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.908545971 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.908628941 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.908710003 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.923593998 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.923655987 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.923741102 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.923758030 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.923815966 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.923815966 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.923969030 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.924016953 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:55.924046040 CEST50078443192.168.2.720.114.59.183
                        Jul 25, 2024 21:34:55.924062967 CEST4435007820.114.59.183192.168.2.7
                        Jul 25, 2024 21:34:56.257704020 CEST50087445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:56.262836933 CEST44550087210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:56.262923956 CEST50087445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:56.262957096 CEST50087445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:34:56.267853975 CEST44550087210.44.60.1192.168.2.7
                        Jul 25, 2024 21:34:56.570373058 CEST50088445192.168.2.7132.107.82.189
                        Jul 25, 2024 21:34:56.575476885 CEST44550088132.107.82.189192.168.2.7
                        Jul 25, 2024 21:34:56.575644970 CEST50088445192.168.2.7132.107.82.189
                        Jul 25, 2024 21:34:56.575644970 CEST50088445192.168.2.7132.107.82.189
                        Jul 25, 2024 21:34:56.575740099 CEST50089445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.581038952 CEST44550089132.107.82.1192.168.2.7
                        Jul 25, 2024 21:34:56.581119061 CEST50089445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.581149101 CEST50089445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.581518888 CEST50090445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.581708908 CEST44550088132.107.82.189192.168.2.7
                        Jul 25, 2024 21:34:56.581934929 CEST50088445192.168.2.7132.107.82.189
                        Jul 25, 2024 21:34:56.586339951 CEST44550090132.107.82.1192.168.2.7
                        Jul 25, 2024 21:34:56.586412907 CEST50090445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.586448908 CEST50090445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.586828947 CEST44550089132.107.82.1192.168.2.7
                        Jul 25, 2024 21:34:56.586888075 CEST50089445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:34:56.591351986 CEST44550090132.107.82.1192.168.2.7
                        Jul 25, 2024 21:34:57.292134047 CEST44550021100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:57.292224884 CEST50021445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:57.292264938 CEST50021445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:57.292284966 CEST50021445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:34:57.297278881 CEST44550021100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:57.297599077 CEST44550021100.100.254.1192.168.2.7
                        Jul 25, 2024 21:34:57.336332083 CEST50091445192.168.2.713.55.192.105
                        Jul 25, 2024 21:34:57.341468096 CEST4455009113.55.192.105192.168.2.7
                        Jul 25, 2024 21:34:57.341592073 CEST50091445192.168.2.713.55.192.105
                        Jul 25, 2024 21:34:57.341592073 CEST50091445192.168.2.713.55.192.105
                        Jul 25, 2024 21:34:57.341718912 CEST50092445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.346978903 CEST4455009213.55.192.1192.168.2.7
                        Jul 25, 2024 21:34:57.347079039 CEST50092445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.347227097 CEST50092445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.347640038 CEST4455009113.55.192.105192.168.2.7
                        Jul 25, 2024 21:34:57.347731113 CEST4455009113.55.192.105192.168.2.7
                        Jul 25, 2024 21:34:57.347757101 CEST50093445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.347866058 CEST50091445192.168.2.713.55.192.105
                        Jul 25, 2024 21:34:57.352547884 CEST4455009313.55.192.1192.168.2.7
                        Jul 25, 2024 21:34:57.352619886 CEST50093445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.352663994 CEST50093445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.353282928 CEST4455009213.55.192.1192.168.2.7
                        Jul 25, 2024 21:34:57.353338957 CEST50092445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.616826057 CEST4455009213.55.192.1192.168.2.7
                        Jul 25, 2024 21:34:57.616934061 CEST50092445192.168.2.713.55.192.1
                        Jul 25, 2024 21:34:57.617034912 CEST4455009313.55.192.1192.168.2.7
                        Jul 25, 2024 21:34:57.621835947 CEST4455009213.55.192.1192.168.2.7
                        Jul 25, 2024 21:34:57.725344896 CEST44550022185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:57.725578070 CEST50022445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:57.725701094 CEST50022445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:57.725775003 CEST50022445192.168.2.7185.127.160.1
                        Jul 25, 2024 21:34:57.730623960 CEST44550022185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:57.730993986 CEST44550022185.127.160.1192.168.2.7
                        Jul 25, 2024 21:34:57.741955996 CEST50094445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:57.746846914 CEST4455009495.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:57.746928930 CEST50094445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:57.746957064 CEST50094445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:57.751990080 CEST4455009495.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:57.789004087 CEST50095445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.793978930 CEST44550095185.127.160.2192.168.2.7
                        Jul 25, 2024 21:34:57.794064045 CEST50095445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.794105053 CEST50095445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.794645071 CEST50096445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.799382925 CEST44550095185.127.160.2192.168.2.7
                        Jul 25, 2024 21:34:57.799603939 CEST44550096185.127.160.2192.168.2.7
                        Jul 25, 2024 21:34:57.799803019 CEST50096445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.799803019 CEST50096445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.800700903 CEST44550095185.127.160.2192.168.2.7
                        Jul 25, 2024 21:34:57.800756931 CEST50095445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:34:57.804600000 CEST44550096185.127.160.2192.168.2.7
                        Jul 25, 2024 21:34:58.571500063 CEST44349829104.98.116.138192.168.2.7
                        Jul 25, 2024 21:34:58.571621895 CEST49829443192.168.2.7104.98.116.138
                        Jul 25, 2024 21:34:59.295228958 CEST4455002594.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:59.295344114 CEST50025445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:59.295389891 CEST50025445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:59.295444012 CEST50025445192.168.2.794.16.11.1
                        Jul 25, 2024 21:34:59.301632881 CEST4455002594.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:59.301990032 CEST4455002594.16.11.1192.168.2.7
                        Jul 25, 2024 21:34:59.502515078 CEST4455009495.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:59.502579927 CEST50094445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:59.502624035 CEST50094445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:59.502648115 CEST50094445192.168.2.795.43.108.1
                        Jul 25, 2024 21:34:59.507590055 CEST4455009495.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:59.507882118 CEST4455009495.43.108.1192.168.2.7
                        Jul 25, 2024 21:34:59.522233009 CEST44550026119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:59.522305012 CEST50026445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:59.522424936 CEST50026445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:59.522424936 CEST50026445192.168.2.7119.225.62.1
                        Jul 25, 2024 21:34:59.527566910 CEST44550026119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:59.530173063 CEST44550026119.225.62.1192.168.2.7
                        Jul 25, 2024 21:34:59.555145979 CEST50101445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.560116053 CEST4455010195.43.108.2192.168.2.7
                        Jul 25, 2024 21:34:59.560178041 CEST50101445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.560311079 CEST50101445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.560853004 CEST50102445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.566324949 CEST4455010295.43.108.2192.168.2.7
                        Jul 25, 2024 21:34:59.566385031 CEST50102445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.566819906 CEST4455010195.43.108.2192.168.2.7
                        Jul 25, 2024 21:34:59.566852093 CEST50102445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.566874981 CEST50101445192.168.2.795.43.108.2
                        Jul 25, 2024 21:34:59.571885109 CEST4455010295.43.108.2192.168.2.7
                        Jul 25, 2024 21:34:59.586294889 CEST50103445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.591145039 CEST44550103119.225.62.2192.168.2.7
                        Jul 25, 2024 21:34:59.591276884 CEST50103445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.598184109 CEST50103445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.599246979 CEST50104445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.603312969 CEST44550103119.225.62.2192.168.2.7
                        Jul 25, 2024 21:34:59.603804111 CEST44550103119.225.62.2192.168.2.7
                        Jul 25, 2024 21:34:59.603856087 CEST50103445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.604418993 CEST44550104119.225.62.2192.168.2.7
                        Jul 25, 2024 21:34:59.604479074 CEST50104445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.604522943 CEST50104445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:34:59.609496117 CEST44550104119.225.62.2192.168.2.7
                        Jul 25, 2024 21:35:00.304640055 CEST50108445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:35:00.309660912 CEST44550108100.100.254.1192.168.2.7
                        Jul 25, 2024 21:35:00.311918974 CEST50108445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:35:00.311984062 CEST50108445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:35:00.317914009 CEST44550108100.100.254.1192.168.2.7
                        Jul 25, 2024 21:35:01.354813099 CEST4455003016.68.196.1192.168.2.7
                        Jul 25, 2024 21:35:01.354979992 CEST50030445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:01.355024099 CEST50030445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:01.355082035 CEST50030445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:01.360039949 CEST4455003016.68.196.1192.168.2.7
                        Jul 25, 2024 21:35:01.360120058 CEST4455003016.68.196.1192.168.2.7
                        Jul 25, 2024 21:35:01.646239996 CEST4455003136.4.231.1192.168.2.7
                        Jul 25, 2024 21:35:01.646392107 CEST50031445192.168.2.736.4.231.1
                        Jul 25, 2024 21:35:01.646441936 CEST50031445192.168.2.736.4.231.1
                        Jul 25, 2024 21:35:01.646544933 CEST50031445192.168.2.736.4.231.1
                        Jul 25, 2024 21:35:01.651352882 CEST4455003136.4.231.1192.168.2.7
                        Jul 25, 2024 21:35:01.651379108 CEST4455003136.4.231.1192.168.2.7
                        Jul 25, 2024 21:35:01.710797071 CEST50118445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.716250896 CEST4455011836.4.231.2192.168.2.7
                        Jul 25, 2024 21:35:01.716370106 CEST50118445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.716403961 CEST50118445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.716823101 CEST50119445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.721710920 CEST4455011936.4.231.2192.168.2.7
                        Jul 25, 2024 21:35:01.721795082 CEST50119445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.721821070 CEST50119445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.726774931 CEST4455011936.4.231.2192.168.2.7
                        Jul 25, 2024 21:35:01.727427006 CEST4455011836.4.231.2192.168.2.7
                        Jul 25, 2024 21:35:01.730156898 CEST4455011836.4.231.2192.168.2.7
                        Jul 25, 2024 21:35:01.730216026 CEST50118445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:01.994319916 CEST44550033188.219.99.2192.168.2.7
                        Jul 25, 2024 21:35:01.994471073 CEST50033445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:01.994525909 CEST50033445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:01.994535923 CEST50033445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:01.999593973 CEST44550033188.219.99.2192.168.2.7
                        Jul 25, 2024 21:35:01.999732971 CEST44550033188.219.99.2192.168.2.7
                        Jul 25, 2024 21:35:02.304672956 CEST50124445192.168.2.794.16.11.1
                        Jul 25, 2024 21:35:02.310252905 CEST4455012494.16.11.1192.168.2.7
                        Jul 25, 2024 21:35:02.310389996 CEST50124445192.168.2.794.16.11.1
                        Jul 25, 2024 21:35:02.310425997 CEST50124445192.168.2.794.16.11.1
                        Jul 25, 2024 21:35:02.315221071 CEST4455012494.16.11.1192.168.2.7
                        Jul 25, 2024 21:35:04.366985083 CEST50150445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:04.372087955 CEST4455015016.68.196.1192.168.2.7
                        Jul 25, 2024 21:35:04.372198105 CEST50150445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:04.372248888 CEST50150445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:04.377100945 CEST4455015016.68.196.1192.168.2.7
                        Jul 25, 2024 21:35:05.007462978 CEST50162445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:05.012411118 CEST44550162188.219.99.2192.168.2.7
                        Jul 25, 2024 21:35:05.012578011 CEST50162445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:05.012643099 CEST50162445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:05.017479897 CEST44550162188.219.99.2192.168.2.7
                        Jul 25, 2024 21:35:06.092075109 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.092173100 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:06.092247009 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:06.092298985 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:06.092744112 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.092814922 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:06.093142986 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.093200922 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:06.093427896 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.093482018 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:35:06.093553066 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:35:06.093619108 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:35:06.093635082 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.093698025 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:35:06.093708038 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.093748093 CEST50039445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:06.094023943 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.094136000 CEST50040445192.168.2.758.57.197.1
                        Jul 25, 2024 21:35:06.099292994 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.099319935 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.099330902 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.099406958 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.099476099 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.099486113 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.099520922 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.099531889 CEST445500394.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:06.101042032 CEST4455004058.57.197.1192.168.2.7
                        Jul 25, 2024 21:35:06.148158073 CEST50186445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.153064966 CEST4455018658.57.197.2192.168.2.7
                        Jul 25, 2024 21:35:06.153143883 CEST50186445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.153173923 CEST50186445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.153485060 CEST50187445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.161755085 CEST4455018658.57.197.2192.168.2.7
                        Jul 25, 2024 21:35:06.161789894 CEST4455018758.57.197.2192.168.2.7
                        Jul 25, 2024 21:35:06.161834002 CEST50186445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.161880016 CEST50187445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.161900997 CEST50187445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:06.167011976 CEST4455018758.57.197.2192.168.2.7
                        Jul 25, 2024 21:35:06.588248968 CEST4455004395.210.118.1192.168.2.7
                        Jul 25, 2024 21:35:06.588362932 CEST50043445192.168.2.795.210.118.1
                        Jul 25, 2024 21:35:06.588416100 CEST50043445192.168.2.795.210.118.1
                        Jul 25, 2024 21:35:06.588464975 CEST50043445192.168.2.795.210.118.1
                        Jul 25, 2024 21:35:06.593318939 CEST4455004395.210.118.1192.168.2.7
                        Jul 25, 2024 21:35:06.593374968 CEST4455004395.210.118.1192.168.2.7
                        Jul 25, 2024 21:35:07.569827080 CEST44550044152.246.44.1192.168.2.7
                        Jul 25, 2024 21:35:07.569993973 CEST50044445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:35:07.570029974 CEST50044445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:35:07.570029974 CEST50044445192.168.2.7152.246.44.1
                        Jul 25, 2024 21:35:07.574850082 CEST44550044152.246.44.1192.168.2.7
                        Jul 25, 2024 21:35:07.574975014 CEST44550044152.246.44.1192.168.2.7
                        Jul 25, 2024 21:35:07.632772923 CEST50234445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.640113115 CEST44550234152.246.44.2192.168.2.7
                        Jul 25, 2024 21:35:07.640280962 CEST50234445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.640383005 CEST50234445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.640827894 CEST50235445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.648165941 CEST44550235152.246.44.2192.168.2.7
                        Jul 25, 2024 21:35:07.648205042 CEST44550234152.246.44.2192.168.2.7
                        Jul 25, 2024 21:35:07.648257017 CEST50235445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.648350954 CEST50235445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.648511887 CEST50234445192.168.2.7152.246.44.2
                        Jul 25, 2024 21:35:07.653353930 CEST44550235152.246.44.2192.168.2.7
                        Jul 25, 2024 21:35:08.098902941 CEST44550047136.185.8.1192.168.2.7
                        Jul 25, 2024 21:35:08.098968983 CEST50047445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:35:08.099004030 CEST50047445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:35:08.099021912 CEST50047445192.168.2.7136.185.8.1
                        Jul 25, 2024 21:35:08.105365992 CEST44550047136.185.8.1192.168.2.7
                        Jul 25, 2024 21:35:08.105380058 CEST44550047136.185.8.1192.168.2.7
                        Jul 25, 2024 21:35:09.101459980 CEST50350445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:09.106590986 CEST445503504.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:09.106730938 CEST50350445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:09.106774092 CEST50350445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:09.111908913 CEST445503504.84.89.1192.168.2.7
                        Jul 25, 2024 21:35:09.572779894 CEST4455005168.75.152.1192.168.2.7
                        Jul 25, 2024 21:35:09.572844028 CEST50051445192.168.2.768.75.152.1
                        Jul 25, 2024 21:35:09.667088985 CEST44550052185.124.94.1192.168.2.7
                        Jul 25, 2024 21:35:09.667156935 CEST50052445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:35:09.920670033 CEST50064445192.168.2.764.16.93.2
                        Jul 25, 2024 21:35:09.920701027 CEST50102445192.168.2.795.43.108.2
                        Jul 25, 2024 21:35:09.920727968 CEST50062445192.168.2.7161.221.47.1
                        Jul 25, 2024 21:35:09.920772076 CEST50059445192.168.2.7202.230.132.1
                        Jul 25, 2024 21:35:09.920806885 CEST50058445192.168.2.780.67.170.1
                        Jul 25, 2024 21:35:09.920829058 CEST50350445192.168.2.74.84.89.1
                        Jul 25, 2024 21:35:09.920846939 CEST50073445192.168.2.710.54.96.2
                        Jul 25, 2024 21:35:09.920887947 CEST50083445192.168.2.76.118.192.2
                        Jul 25, 2024 21:35:09.920964956 CEST50119445192.168.2.736.4.231.2
                        Jul 25, 2024 21:35:09.920994997 CEST50054445192.168.2.790.64.160.2
                        Jul 25, 2024 21:35:09.921022892 CEST50077445192.168.2.7199.207.38.1
                        Jul 25, 2024 21:35:09.921052933 CEST50052445192.168.2.7185.124.94.1
                        Jul 25, 2024 21:35:09.921076059 CEST50187445192.168.2.758.57.197.2
                        Jul 25, 2024 21:35:09.921099901 CEST50124445192.168.2.794.16.11.1
                        Jul 25, 2024 21:35:09.921130896 CEST50051445192.168.2.768.75.152.1
                        Jul 25, 2024 21:35:09.921150923 CEST50055445192.168.2.7199.180.31.2
                        Jul 25, 2024 21:35:09.921180010 CEST50067445192.168.2.799.44.247.1
                        Jul 25, 2024 21:35:09.921205997 CEST50068445192.168.2.769.235.55.1
                        Jul 25, 2024 21:35:09.921233892 CEST50104445192.168.2.7119.225.62.2
                        Jul 25, 2024 21:35:09.921258926 CEST50076445192.168.2.7162.84.231.1
                        Jul 25, 2024 21:35:09.921287060 CEST50081445192.168.2.72.251.193.1
                        Jul 25, 2024 21:35:09.921312094 CEST50086445192.168.2.7210.211.15.1
                        Jul 25, 2024 21:35:09.921336889 CEST50087445192.168.2.7210.44.60.1
                        Jul 25, 2024 21:35:09.921361923 CEST50090445192.168.2.7132.107.82.1
                        Jul 25, 2024 21:35:09.921389103 CEST50093445192.168.2.713.55.192.1
                        Jul 25, 2024 21:35:09.921412945 CEST50096445192.168.2.7185.127.160.2
                        Jul 25, 2024 21:35:09.921436071 CEST50108445192.168.2.7100.100.254.1
                        Jul 25, 2024 21:35:09.921483040 CEST50150445192.168.2.716.68.196.1
                        Jul 25, 2024 21:35:09.921503067 CEST50162445192.168.2.7188.219.99.2
                        Jul 25, 2024 21:35:09.921611071 CEST50235445192.168.2.7152.246.44.2
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 25, 2024 21:34:02.298829079 CEST5334253192.168.2.71.1.1.1
                        Jul 25, 2024 21:34:02.458976984 CEST53533421.1.1.1192.168.2.7
                        Jul 25, 2024 21:34:03.331279039 CEST5947953192.168.2.71.1.1.1
                        Jul 25, 2024 21:34:03.373613119 CEST5698953192.168.2.71.1.1.1
                        Jul 25, 2024 21:34:03.732742071 CEST53594791.1.1.1192.168.2.7
                        Jul 25, 2024 21:34:58.932574034 CEST138138192.168.2.7192.168.2.255
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jul 25, 2024 21:34:02.298829079 CEST192.168.2.71.1.1.10x1be7Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                        Jul 25, 2024 21:34:03.331279039 CEST192.168.2.71.1.1.10x6a1cStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                        Jul 25, 2024 21:34:03.373613119 CEST192.168.2.71.1.1.10xdce8Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jul 25, 2024 21:34:02.458976984 CEST1.1.1.1192.168.2.70x1be7No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                        Jul 25, 2024 21:34:03.380820036 CEST1.1.1.1192.168.2.70xdce8No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                        Jul 25, 2024 21:34:03.732742071 CEST1.1.1.1192.168.2.70x6a1cNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                        Jul 25, 2024 21:34:03.732742071 CEST1.1.1.1192.168.2.70x6a1cNo error (0)77026.bodis.com199.59.243.226A (IP address)IN (0x0001)false
                        • slscr.update.microsoft.com
                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749699103.224.212.215807444C:\Windows\mssecsvr.exe
                        TimestampBytes transferredDirectionData
                        Jul 25, 2024 21:34:02.529356956 CEST100OUTGET / HTTP/1.1
                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Cache-Control: no-cache
                        Jul 25, 2024 21:34:03.214509964 CEST365INHTTP/1.1 302 Found
                        date: Thu, 25 Jul 2024 19:34:03 GMT
                        server: Apache
                        set-cookie: __tad=1721936043.4587265; expires=Sun, 23-Jul-2034 19:34:03 GMT; Max-Age=315360000
                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-0355-9ff5-0a1ebde5efcd
                        content-length: 2
                        content-type: text/html; charset=UTF-8
                        connection: close
                        Data Raw: 0a 0a
                        Data Ascii:


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.749700199.59.243.226807444C:\Windows\mssecsvr.exe
                        TimestampBytes transferredDirectionData
                        Jul 25, 2024 21:34:03.739309072 CEST169OUTGET /?subid1=20240726-0534-0355-9ff5-0a1ebde5efcd HTTP/1.1
                        Cache-Control: no-cache
                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Connection: Keep-Alive
                        Jul 25, 2024 21:34:04.264836073 CEST1236INHTTP/1.1 200 OK
                        date: Thu, 25 Jul 2024 19:34:03 GMT
                        content-type: text/html; charset=utf-8
                        content-length: 1258
                        x-request-id: 39fec269-4c93-4234-939b-afff81d34501
                        cache-control: no-store, max-age=0
                        accept-ch: sec-ch-prefers-color-scheme
                        critical-ch: sec-ch-prefers-color-scheme
                        vary: sec-ch-prefers-color-scheme
                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_xd0yCVLfM8BCXZUJD4UEVURLtYXqxPUAKiLkM8jMdzak7wRBZVYYlCa1Cv0FPqUSmgYKCHB1NIcTw0Ym97R5hQ==
                        set-cookie: parking_session=39fec269-4c93-4234-939b-afff81d34501; expires=Thu, 25 Jul 2024 19:49:04 GMT; path=/
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 78 64 30 79 43 56 4c 66 4d 38 42 43 58 5a 55 4a 44 34 55 45 56 55 52 4c 74 59 58 71 78 50 55 41 4b 69 4c 6b 4d 38 6a 4d 64 7a 61 6b 37 77 52 42 5a 56 59 59 6c 43 61 31 43 76 30 46 50 71 55 53 6d 67 59 4b 43 48 42 31 4e 49 63 54 77 30 59 6d 39 37 52 35 68 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_xd0yCVLfM8BCXZUJD4UEVURLtYXqxPUAKiLkM8jMdzak7wRBZVYYlCa1Cv0FPqUSmgYKCHB1NIcTw0Ym97R5hQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                        Jul 25, 2024 21:34:04.265207052 CEST692INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMzlmZWMyNjktNGM5My00MjM0LTkzOWItYWZmZjgxZDM0NTAxIiwicGFnZV90aW1lIjoxNzIxOTM2MDQ0LCJwYWdlX3VybCI6I


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.749701103.224.212.215807616C:\Windows\mssecsvr.exe
                        TimestampBytes transferredDirectionData
                        Jul 25, 2024 21:34:04.377120972 CEST100OUTGET / HTTP/1.1
                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Cache-Control: no-cache
                        Jul 25, 2024 21:34:05.012617111 CEST365INHTTP/1.1 302 Found
                        date: Thu, 25 Jul 2024 19:34:04 GMT
                        server: Apache
                        set-cookie: __tad=1721936044.1705878; expires=Sun, 23-Jul-2034 19:34:04 GMT; Max-Age=315360000
                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-041f-8fb2-8866394234ea
                        content-length: 2
                        content-type: text/html; charset=UTF-8
                        connection: close
                        Data Raw: 0a 0a
                        Data Ascii:


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.749702103.224.212.215807664C:\Windows\mssecsvr.exe
                        TimestampBytes transferredDirectionData
                        Jul 25, 2024 21:34:04.926732063 CEST134OUTGET / HTTP/1.1
                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Cache-Control: no-cache
                        Cookie: __tad=1721936043.4587265
                        Jul 25, 2024 21:34:05.547842979 CEST269INHTTP/1.1 302 Found
                        date: Thu, 25 Jul 2024 19:34:05 GMT
                        server: Apache
                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20240726-0534-055f-94f1-815196e9c5be
                        content-length: 2
                        content-type: text/html; charset=UTF-8
                        connection: close
                        Data Raw: 0a 0a
                        Data Ascii:


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.749703199.59.243.226807616C:\Windows\mssecsvr.exe
                        TimestampBytes transferredDirectionData
                        Jul 25, 2024 21:34:05.024918079 CEST169OUTGET /?subid1=20240726-0534-041f-8fb2-8866394234ea HTTP/1.1
                        Cache-Control: no-cache
                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Connection: Keep-Alive
                        Jul 25, 2024 21:34:05.520668983 CEST1236INHTTP/1.1 200 OK
                        date: Thu, 25 Jul 2024 19:34:05 GMT
                        content-type: text/html; charset=utf-8
                        content-length: 1258
                        x-request-id: 919c307f-dda8-4176-838a-b517f9748f49
                        cache-control: no-store, max-age=0
                        accept-ch: sec-ch-prefers-color-scheme
                        critical-ch: sec-ch-prefers-color-scheme
                        vary: sec-ch-prefers-color-scheme
                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_PM2oRDhw0CQDlbdo7/qRNIEE1krKgcihNHsa+p7GISCXZTvEldJo/ksmL3gpc82GWcRJ/2mAsKzoy+3f3v9ULw==
                        set-cookie: parking_session=919c307f-dda8-4176-838a-b517f9748f49; expires=Thu, 25 Jul 2024 19:49:05 GMT; path=/
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 50 4d 32 6f 52 44 68 77 30 43 51 44 6c 62 64 6f 37 2f 71 52 4e 49 45 45 31 6b 72 4b 67 63 69 68 4e 48 73 61 2b 70 37 47 49 53 43 58 5a 54 76 45 6c 64 4a 6f 2f 6b 73 6d 4c 33 67 70 63 38 32 47 57 63 52 4a 2f 32 6d 41 73 4b 7a 6f 79 2b 33 66 33 76 39 55 4c 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_PM2oRDhw0CQDlbdo7/qRNIEE1krKgcihNHsa+p7GISCXZTvEldJo/ksmL3gpc82GWcRJ/2mAsKzoy+3f3v9ULw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                        Jul 25, 2024 21:34:05.521080971 CEST692INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiOTE5YzMwN2YtZGRhOC00MTc2LTgzOGEtYjUxN2Y5NzQ4ZjQ5IiwicGFnZV90aW1lIjoxNzIxOTM2MDQ1LCJwYWdlX3VybCI6I


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.749704199.59.243.226807664C:\Windows\mssecsvr.exe
                        TimestampBytes transferredDirectionData
                        Jul 25, 2024 21:34:05.592134953 CEST231OUTGET /?subid1=20240726-0534-055f-94f1-815196e9c5be HTTP/1.1
                        Cache-Control: no-cache
                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        Connection: Keep-Alive
                        Cookie: parking_session=39fec269-4c93-4234-939b-afff81d34501
                        Jul 25, 2024 21:34:06.150805950 CEST1236INHTTP/1.1 200 OK
                        date: Thu, 25 Jul 2024 19:34:05 GMT
                        content-type: text/html; charset=utf-8
                        content-length: 1258
                        x-request-id: 1ba5d0c3-5262-420b-a65d-2eb105ed0fc3
                        cache-control: no-store, max-age=0
                        accept-ch: sec-ch-prefers-color-scheme
                        critical-ch: sec-ch-prefers-color-scheme
                        vary: sec-ch-prefers-color-scheme
                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_CSy8PRVpT8RbgX54TyM/QZgIWTMgISpVsVs4DpYhOg5QifCOT5HOV9GCq15hoy3o/U7MnG2FwtSQ4Bl9cryJDQ==
                        set-cookie: parking_session=39fec269-4c93-4234-939b-afff81d34501; expires=Thu, 25 Jul 2024 19:49:06 GMT
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 43 53 79 38 50 52 56 70 54 38 52 62 67 58 35 34 54 79 4d 2f 51 5a 67 49 57 54 4d 67 49 53 70 56 73 56 73 34 44 70 59 68 4f 67 35 51 69 66 43 4f 54 35 48 4f 56 39 47 43 71 31 35 68 6f 79 33 6f 2f 55 37 4d 6e 47 32 46 77 74 53 51 34 42 6c 39 63 72 79 4a 44 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_CSy8PRVpT8RbgX54TyM/QZgIWTMgISpVsVs4DpYhOg5QifCOT5HOV9GCq15hoy3o/U7MnG2FwtSQ4Bl9cryJDQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                        Jul 25, 2024 21:34:06.151657104 CEST684INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                        Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMzlmZWMyNjktNGM5My00MjM0LTkzOWItYWZmZjgxZDM0NTAxIiwicGFnZV90aW1lIjoxNzIxOTM2MDQ2LCJwYWdlX3VybCI6Imh0dHA6L


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.74982120.114.59.183443
                        TimestampBytes transferredDirectionData
                        2024-07-25 19:34:16 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cmhE9WbprTxRD5l&MD=pYgsfsSr HTTP/1.1
                        Connection: Keep-Alive
                        Accept: */*
                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                        Host: slscr.update.microsoft.com
                        2024-07-25 19:34:17 UTC560INHTTP/1.1 200 OK
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Content-Type: application/octet-stream
                        Expires: -1
                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                        MS-CorrelationId: 9e6ce33e-9e15-47e9-be02-6c66735bb17a
                        MS-RequestId: 824b2cb6-6a29-427b-a159-212d3886d6bc
                        MS-CV: fUuH/aFa0kW17gM7.0
                        X-Microsoft-SLSClientCache: 2880
                        Content-Disposition: attachment; filename=environment.cab
                        X-Content-Type-Options: nosniff
                        Date: Thu, 25 Jul 2024 19:34:16 GMT
                        Connection: close
                        Content-Length: 24490
                        2024-07-25 19:34:17 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                        2024-07-25 19:34:17 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.75007820.114.59.183443
                        TimestampBytes transferredDirectionData
                        2024-07-25 19:34:55 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cmhE9WbprTxRD5l&MD=pYgsfsSr HTTP/1.1
                        Connection: Keep-Alive
                        Accept: */*
                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                        Host: slscr.update.microsoft.com
                        2024-07-25 19:34:55 UTC560INHTTP/1.1 200 OK
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Content-Type: application/octet-stream
                        Expires: -1
                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                        MS-CorrelationId: 4ca8fc7c-5511-4d3c-8d77-92033339ab66
                        MS-RequestId: 8b4afcca-d180-46bf-b1a3-5fd3e7fb96c8
                        MS-CV: gcUg5FioXUC8/dvz.0
                        X-Microsoft-SLSClientCache: 1440
                        Content-Disposition: attachment; filename=environment.cab
                        X-Content-Type-Options: nosniff
                        Date: Thu, 25 Jul 2024 19:34:54 GMT
                        Connection: close
                        Content-Length: 30005
                        2024-07-25 19:34:55 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                        2024-07-25 19:34:55 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:15:34:00
                        Start date:25/07/2024
                        Path:C:\Windows\System32\loaddll32.exe
                        Wow64 process (32bit):true
                        Commandline:loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll"
                        Imagebase:0x4e0000
                        File size:126'464 bytes
                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:15:34:00
                        Start date:25/07/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:15:34:01
                        Start date:25/07/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1
                        Imagebase:0x410000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:15:34:01
                        Start date:25/07/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002A_327.dll,PlayGame
                        Imagebase:0x350000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:15:34:01
                        Start date:25/07/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",#1
                        Imagebase:0x350000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:15:34:01
                        Start date:25/07/2024
                        Path:C:\Windows\mssecsvr.exe
                        Wow64 process (32bit):true
                        Commandline:C:\WINDOWS\mssecsvr.exe
                        Imagebase:0x400000
                        File size:2'281'472 bytes
                        MD5 hash:60A91A498C0F1FFDDEF484C5A4D42564
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1297845687.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1297973978.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1297973978.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvr.exe, Author: ReversingLabs
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        Reputation:low
                        Has exited:true

                        Target ID:8
                        Start time:15:34:02
                        Start date:25/07/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:9
                        Start time:15:34:03
                        Start date:25/07/2024
                        Path:C:\Windows\mssecsvr.exe
                        Wow64 process (32bit):true
                        Commandline:C:\WINDOWS\mssecsvr.exe -m security
                        Imagebase:0x400000
                        File size:2'281'472 bytes
                        MD5 hash:60A91A498C0F1FFDDEF484C5A4D42564
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1322838033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1322838033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1972575394.0000000001D5E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1972575394.0000000001D5E000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1322719614.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1972756937.0000000002286000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1972756937.0000000002286000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                        Reputation:low
                        Has exited:true

                        Target ID:10
                        Start time:15:34:04
                        Start date:25/07/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002A_327.dll",PlayGame
                        Imagebase:0x350000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:11
                        Start time:15:34:04
                        Start date:25/07/2024
                        Path:C:\Windows\mssecsvr.exe
                        Wow64 process (32bit):true
                        Commandline:C:\WINDOWS\mssecsvr.exe
                        Imagebase:0x400000
                        File size:2'281'472 bytes
                        MD5 hash:60A91A498C0F1FFDDEF484C5A4D42564
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1326342765.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1341643809.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1341790477.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1326501700.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1326501700.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                        Reputation:low
                        Has exited:true

                        Target ID:13
                        Start time:16:49:52
                        Start date:25/07/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:71.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:64.9%
                          Total number of Nodes:37
                          Total number of Limit Nodes:9

                          Callgraph

                          Control-flow Graph

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBF0EF0,?,00000000), ref: 00407CEF
                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                          • sprintf.MSVCRT ref: 00407E01
                          • sprintf.MSVCRT ref: 00407E18
                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00407E68
                          • CreateProcessA.KERNELBASE ref: 00407EE8
                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.1336900933.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000006.00000002.1336876669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336933075.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337034661.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProcResource$CloseFileHandle$CreateFindsprintf$ChangeLoadLockModuleMoveNotificationProcessSizeofWrite
                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                          • API String ID: 1541710770-1507730452
                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.1336900933.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000006.00000002.1336876669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336933075.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337034661.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                          • String ID:
                          • API String ID: 801014965-0
                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                          Control-flow Graph

                          APIs
                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                          Strings
                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                          Memory Dump Source
                          • Source File: 00000006.00000002.1336900933.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000006.00000002.1336876669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336933075.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337034661.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                          • API String ID: 774561529-2614457033
                          • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                          • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                          • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                          • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                          Control-flow Graph

                          APIs
                          • sprintf.MSVCRT ref: 00407C56
                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBF0EF0,00000000), ref: 00407C9B
                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.1336900933.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000006.00000002.1336876669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336933075.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337034661.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                          • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                          • API String ID: 3340711343-2450984573
                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                          • __p___argc.MSVCRT ref: 004080A5
                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6FBF0EF0,00000000,?,004081B2), ref: 004080DC
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.1336900933.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000006.00000002.1336876669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336933075.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1336955844.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337034661.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000006.00000002.1337178358.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                          • String ID: mssecsvc2.1
                          • API String ID: 4274534310-2839763450
                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                          Execution Graph

                          Execution Coverage:34.9%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:35
                          Total number of Limit Nodes:2

                          Callgraph

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                          • __p___argc.MSVCRT ref: 004080A5
                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6FBF0EF0,00000000,?,004081B2), ref: 004080DC
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.1971398120.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.1971383718.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971414062.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971476922.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971494335.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                          • String ID: mssecsvc2.1
                          • API String ID: 4274534310-2839763450
                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                          Control-flow Graph

                          APIs
                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                          Strings
                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                          Memory Dump Source
                          • Source File: 00000009.00000002.1971398120.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.1971383718.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971414062.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971476922.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971494335.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                          • API String ID: 774561529-2614457033
                          • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                          • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                          • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                          • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                          Control-flow Graph

                          APIs
                          • sprintf.MSVCRT ref: 00407C56
                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBF0EF0,00000000), ref: 00407C9B
                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.1971398120.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.1971383718.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971414062.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971476922.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971494335.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                          • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                          • API String ID: 3340711343-2450984573
                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBF0EF0,?,00000000), ref: 00407CEF
                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                          • sprintf.MSVCRT ref: 00407E01
                          • sprintf.MSVCRT ref: 00407E18
                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.1971398120.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.1971383718.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971414062.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971476922.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971494335.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                          • API String ID: 4072214828-1507730452
                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000009.00000002.1971398120.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.1971383718.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971414062.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971427381.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971460470.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971476922.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971494335.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000009.00000002.1971583728.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_mssecsvr.jbxd
                          Yara matches
                          Similarity
                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                          • String ID:
                          • API String ID: 801014965-0
                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59