Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mlfk8sYaiy.dll

Overview

General Information

Sample name:mlfk8sYaiy.dll
renamed because original name is a hash value
Original sample name:4662b44e2534901aba780e2e601e8012.dll
Analysis ID:1591269
MD5:4662b44e2534901aba780e2e601e8012
SHA1:c30d623fe679bfd3fd33c32dbd795a44f5a5c55e
SHA256:62c9a15ea404a7c537028bcabcb5753c0e6c535981c38eef417e6db0611f3eb7
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file does not import any functions
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5544 cmdline: loaddll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 4996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4180 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 348 cmdline: rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 1696 cmdline: C:\WINDOWS\mssecsvr.exe MD5: E12B5051C561A8E11FFF28902B1A9A70)
    • rundll32.exe (PID: 3608 cmdline: rundll32.exe C:\Users\user\Desktop\mlfk8sYaiy.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6772 cmdline: rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 5936 cmdline: C:\WINDOWS\mssecsvr.exe MD5: E12B5051C561A8E11FFF28902B1A9A70)
  • mssecsvr.exe (PID: 3300 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: E12B5051C561A8E11FFF28902B1A9A70)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
mlfk8sYaiy.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    mlfk8sYaiy.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    mlfk8sYaiy.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvr.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        C:\Windows\mssecsvr.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
        • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
        • 0x3136c:$x3: tasksche.exe
        • 0x4157c:$x3: tasksche.exe
        • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
        • 0x415d0:$x5: WNcry@2ol7
        • 0x31344:$x8: C:\%s\qeriuwjhrf
        • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
        • 0xe034:$s1: C:\%s\%s
        • 0x17338:$s1: C:\%s\%s
        • 0x31358:$s1: C:\%s\%s
        • 0x414d0:$s3: cmd.exe /c "%s"
        • 0x73a24:$s4: msg/m_portuguese.wnry
        • 0x2e68c:$s5: \\192.168.56.20\IPC$
        • 0x1ba81:$s6: \\172.16.99.5\IPC$
        • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
        • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
        • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        00000005.00000000.1792421376.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0x32600:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0x32628:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                6.2.mssecsvr.exe.1d45084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                5.2.mssecsvr.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                  5.2.mssecsvr.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                  • 0xf4d8:$x3: tasksche.exe
                  • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                  • 0xf52c:$x5: WNcry@2ol7
                  • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                  • 0xf42c:$s3: cmd.exe /c "%s"
                  • 0x41980:$s4: msg/m_portuguese.wnry
                  5.2.mssecsvr.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                  • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                  • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                  8.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                  • 0xe8d8:$x3: tasksche.exe
                  • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                  • 0xe92c:$x5: WNcry@2ol7
                  • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                  • 0xe82c:$s3: cmd.exe /c "%s"
                  Click to see the 87 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T21:03:29.054224+010028033043Unknown Traffic192.168.2.449730103.224.212.21580TCP
                  2025-01-14T21:03:30.914583+010028033043Unknown Traffic192.168.2.449732103.224.212.21580TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T21:03:28.144912+010028300181A Network Trojan was detected192.168.2.4509911.1.1.153UDP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: mlfk8sYaiy.dllAvira: detected
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489bAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7dAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7d4cAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa0526945Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa05269Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489b53Avira URL Cloud: Label: malware
                  Source: C:\Windows\mssecsvr.exeAvira: detection malicious, Label: TR/Ransom.Gen
                  Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 81%
                  Source: C:\Windows\mssecsvr.exeReversingLabs: Detection: 93%
                  Source: C:\Windows\tasksche.exeReversingLabs: Detection: 81%
                  Source: mlfk8sYaiy.dllReversingLabs: Detection: 92%
                  Source: mlfk8sYaiy.dllVirustotal: Detection: 92%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                  Source: C:\Windows\mssecsvr.exeJoe Sandbox ML: detected
                  Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                  Source: mlfk8sYaiy.dllJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: mlfk8sYaiy.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.4:50991 -> 1.1.1.1:53
                  Source: unknownNetwork traffic detected: IP country count 10
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0703-2865-a082-552e366d7d4c HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0703-3025-82b1-2f8f29489b53 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736885008.2630796
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0703-312e-89e7-547aa0526945 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=229b9e3a-b57d-4a5f-bf1e-23a1a6fda947
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 103.224.212.215:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49732 -> 103.224.212.215:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.161
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.161
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.161
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.161
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 148.126.233.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 17.207.165.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.227
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.227
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.227
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.227
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 51.178.254.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.203.23.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 7.204.138.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 7.204.138.14
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0703-2865-a082-552e366d7d4c HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0703-3025-82b1-2f8f29489b53 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736885008.2630796
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0703-312e-89e7-547aa0526945 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=229b9e3a-b57d-4a5f-bf1e-23a1a6fda947
                  Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvr.exe, 00000005.00000002.1828233980.00000000009DE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1828233980.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7d
                  Source: mssecsvr.exe, 00000006.00000002.2465525985.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2465525985.0000000000A2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489b
                  Source: mssecsvr.exe, 00000008.00000002.1840315057.0000000000CC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa05269
                  Source: mssecsvr.exe.3.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvr.exe, 00000005.00000002.1828233980.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1828233980.00000000009DE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1828233980.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2465525985.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1840315057.0000000000C9E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1840315057.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                  Source: mssecsvr.exe, 00000005.00000002.1828233980.00000000009DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/L
                  Source: mssecsvr.exe, 00000006.00000002.2464994477.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: mlfk8sYaiy.dll, type: SAMPLE
                  Source: Yara matchFile source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.229796c.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.22658c8.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d45084.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.2274948.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d500a4.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.22708e8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.1792421376.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.1821887861.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1813727763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.1792541209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1813606958.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1838019382.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.1822046137.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1838555240.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2466716906.0000000002274000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 1696, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3300, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 5936, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Windows\mssecsvr.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: mlfk8sYaiy.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: mlfk8sYaiy.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d45084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.229796c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.229796c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.22658c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.229796c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.229796c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.22658c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.22658c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d45084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d45084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.2274948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.2274948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d500a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d500a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.22708e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.22708e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000000.1813727763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000005.00000000.1792541209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000000.1822046137.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000002.1838555240.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2466716906.0000000002274000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: mssecsvr.exe.3.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                  Source: tasksche.exe.5.drStatic PE information: No import functions for PE file found
                  Source: mlfk8sYaiy.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: mlfk8sYaiy.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: mlfk8sYaiy.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d45084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.229796c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.229796c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.22658c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.229796c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.229796c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.22658c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.22658c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.2274948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d45084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d45084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.2274948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.2274948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d500a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d500a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.22708e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.22708e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000000.1813727763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000005.00000000.1792541209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000000.1822046137.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000002.1838555240.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2466716906.0000000002274000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: tasksche.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: tasksche.exe.5.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                  Source: tasksche.exe.5.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                  Source: tasksche.exe.5.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                  Source: mlfk8sYaiy.dll, mssecsvr.exe.3.dr, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                  Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/3@2/100
                  Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
                  Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4996:120:WilError_03
                  Source: mlfk8sYaiy.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mlfk8sYaiy.dll,PlayGame
                  Source: mlfk8sYaiy.dllReversingLabs: Detection: 92%
                  Source: mlfk8sYaiy.dllVirustotal: Detection: 92%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mlfk8sYaiy.dll,PlayGame
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                  Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",PlayGame
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mlfk8sYaiy.dll,PlayGameJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",PlayGameJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1Jump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: mlfk8sYaiy.dllStatic file information: File size 5267459 > 1048576
                  Source: mlfk8sYaiy.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                  Source: tasksche.exe.5.drStatic PE information: section name: .text entropy: 7.64063717569669

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exe TID: 3244Thread sleep count: 97 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 3244Thread sleep time: -194000s >= -30000sJump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 5824Thread sleep count: 126 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 5824Thread sleep count: 42 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 3244Thread sleep time: -86400000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                  Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: mssecsvr.exe, 00000005.00000002.1828233980.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1828233980.00000000009DE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2465525985.00000000009E7000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2465525985.0000000000A2A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1840315057.0000000000CCE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1840315057.0000000000C68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1Jump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Service Execution
                  4
                  Windows Service
                  4
                  Windows Service
                  12
                  Masquerading
                  OS Credential Dumping1
                  Network Share Discovery
                  Remote ServicesData from Local System2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  11
                  Process Injection
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Obfuscated Files or Information
                  NTDS1
                  System Information Discovery
                  Distributed Component Object ModelInput Capture3
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Rundll32
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Software Packing
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591269 Sample: mlfk8sYaiy.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 40 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->40 42 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->42 44 77026.bodis.com 2->44 54 Suricata IDS alerts for network traffic 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 7 other signatures 2->60 9 loaddll32.exe 1 2->9         started        11 mssecsvr.exe 12 2->11         started        signatures3 process4 dnsIp5 15 cmd.exe 1 9->15         started        17 rundll32.exe 9->17         started        20 rundll32.exe 1 9->20         started        23 conhost.exe 9->23         started        46 192.168.2.102 unknown unknown 11->46 48 192.168.2.104 unknown unknown 11->48 50 98 other IPs or domains 11->50 62 Connects to many different private IPs via SMB (likely to spread or exploit) 11->62 64 Connects to many different private IPs (likely to spread or exploit) 11->64 signatures6 process7 file8 25 rundll32.exe 15->25         started        52 Drops executables to the windows directory (C:\Windows) and starts them 17->52 27 mssecsvr.exe 13 17->27         started        34 C:\Windows\mssecsvr.exe, PE32 20->34 dropped signatures9 process10 file11 30 mssecsvr.exe 13 25->30         started        36 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->36 dropped process12 file13 38 C:\Windows\tasksche.exe, PE32 30->38 dropped 66 Antivirus detection for dropped file 30->66 68 Multi AV Scanner detection for dropped file 30->68 70 Machine Learning detection for dropped file 30->70 signatures14

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  mlfk8sYaiy.dll92%ReversingLabsWin32.Ransomware.WannaCry
                  mlfk8sYaiy.dll93%VirustotalBrowse
                  mlfk8sYaiy.dll100%AviraTR/AD.WannaCry.nvufj
                  mlfk8sYaiy.dll100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Windows\mssecsvr.exe100%AviraTR/Ransom.Gen
                  C:\Windows\mssecsvr.exe100%Joe Sandbox ML
                  C:\Windows\tasksche.exe100%Joe Sandbox ML
                  C:\WINDOWS\qeriuwjhrf (copy)82%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\mssecsvr.exe93%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\tasksche.exe82%ReversingLabsWin32.Ransomware.WannaCry
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489b100%Avira URL Cloudmalware
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ0%Avira URL Cloudsafe
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7d100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7d4c100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa0526945100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa05269100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489b53100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  77026.bodis.com
                  199.59.243.228
                  truefalse
                    high
                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    103.224.212.215
                    truefalse
                      high
                      ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7d4cfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa0526945false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489b53false
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Lmssecsvr.exe, 00000005.00000002.1828233980.00000000009DE000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489bmssecsvr.exe, 00000006.00000002.2465525985.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2465525985.0000000000A2A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000006.00000002.2464994477.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.commssecsvr.exe.3.drfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7dmssecsvr.exe, 00000005.00000002.1828233980.00000000009DE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1828233980.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa05269mssecsvr.exe, 00000008.00000002.1840315057.0000000000CC1000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              93.140.22.1
                              unknownCroatia (LOCAL Name: Hrvatska)
                              5391T-HTCroatianTelecomIncHRfalse
                              51.178.254.2
                              unknownFrance
                              16276OVHFRfalse
                              51.178.254.1
                              unknownFrance
                              16276OVHFRfalse
                              39.74.29.1
                              unknownChina
                              4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                              206.149.19.247
                              unknownUnited States
                              174COGENT-174USfalse
                              15.181.139.109
                              unknownUnited States
                              5073HPESUSfalse
                              13.103.137.252
                              unknownUnited States
                              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                              172.230.50.2
                              unknownUnited States
                              16625AKAMAI-ASUSfalse
                              85.26.53.1
                              unknownBelgium
                              12392ASBRUTELEVOOBEfalse
                              85.26.53.2
                              unknownBelgium
                              12392ASBRUTELEVOOBEfalse
                              51.178.254.227
                              unknownFrance
                              16276OVHFRfalse
                              174.8.52.1
                              unknownUnited States
                              6327SHAWCAfalse
                              27.44.253.2
                              unknownChina
                              17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                              27.44.253.1
                              unknownChina
                              17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                              95.154.143.226
                              unknownRussian Federation
                              43714EPL-ASRUfalse
                              17.207.165.90
                              unknownUnited States
                              714APPLE-ENGINEERINGUSfalse
                              155.185.174.1
                              unknownItaly
                              137ASGARRConsortiumGARREUfalse
                              15.181.139.2
                              unknownUnited States
                              5073HPESUSfalse
                              15.181.139.1
                              unknownUnited States
                              5073HPESUSfalse
                              214.131.32.23
                              unknownUnited States
                              721DNIC-ASBLK-00721-00726USfalse
                              176.153.185.129
                              unknownFrance
                              5410BOUYGTEL-ISPFRfalse
                              19.72.220.15
                              unknownUnited States
                              3MIT-GATEWAYSUSfalse
                              106.197.232.1
                              unknownIndia
                              45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
                              93.140.22.189
                              unknownCroatia (LOCAL Name: Hrvatska)
                              5391T-HTCroatianTelecomIncHRfalse
                              106.197.232.186
                              unknownIndia
                              45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
                              38.251.3.58
                              unknownUnited States
                              174COGENT-174USfalse
                              197.203.23.1
                              unknownAlgeria
                              36947ALGTEL-ASDZfalse
                              197.203.23.2
                              unknownAlgeria
                              36947ALGTEL-ASDZfalse
                              7.204.138.1
                              unknownUnited States
                              3356LEVEL3USfalse
                              197.203.23.3
                              unknownAlgeria
                              36947ALGTEL-ASDZfalse
                              IP
                              192.168.2.148
                              192.168.2.149
                              192.168.2.146
                              192.168.2.147
                              192.168.2.140
                              192.168.2.141
                              192.168.2.144
                              192.168.2.145
                              192.168.2.142
                              192.168.2.143
                              192.168.2.159
                              192.168.2.157
                              192.168.2.158
                              192.168.2.151
                              192.168.2.152
                              192.168.2.150
                              192.168.2.155
                              192.168.2.156
                              192.168.2.153
                              192.168.2.154
                              192.168.2.126
                              192.168.2.247
                              192.168.2.127
                              192.168.2.248
                              192.168.2.124
                              192.168.2.245
                              192.168.2.125
                              192.168.2.246
                              192.168.2.128
                              192.168.2.249
                              192.168.2.129
                              192.168.2.240
                              192.168.2.122
                              192.168.2.243
                              192.168.2.123
                              192.168.2.244
                              192.168.2.120
                              192.168.2.241
                              192.168.2.121
                              192.168.2.242
                              192.168.2.97
                              192.168.2.137
                              192.168.2.96
                              192.168.2.138
                              192.168.2.99
                              192.168.2.135
                              192.168.2.98
                              192.168.2.136
                              192.168.2.139
                              192.168.2.250
                              192.168.2.130
                              192.168.2.251
                              192.168.2.91
                              192.168.2.90
                              192.168.2.93
                              192.168.2.133
                              192.168.2.254
                              192.168.2.92
                              192.168.2.134
                              192.168.2.95
                              192.168.2.131
                              192.168.2.252
                              192.168.2.94
                              192.168.2.132
                              192.168.2.253
                              192.168.2.104
                              192.168.2.225
                              192.168.2.105
                              192.168.2.226
                              192.168.2.102
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1591269
                              Start date and time:2025-01-14 21:02:24 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 31s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:13
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:mlfk8sYaiy.dll
                              renamed because original name is a hash value
                              Original Sample Name:4662b44e2534901aba780e2e601e8012.dll
                              Detection:MAL
                              Classification:mal100.rans.expl.evad.winDLL@18/3@2/100
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Found application associated with file extension: .dll
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 84.201.210.39, 199.232.210.172, 2.17.190.73, 4.245.163.56, 13.107.253.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              15:03:29API Interceptor1x Sleep call for process: loaddll32.exe modified
                              15:04:04API Interceptor112x Sleep call for process: mssecsvr.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              77026.bodis.comjgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                              • 199.59.243.228
                              8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              WlCVLbzNph.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              Bpfz752pYZ.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              uavINoSIQh.exeGet hashmaliciousSimda StealerBrowse
                              • 199.59.243.227
                              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comjgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                              • 103.224.212.215
                              LisectAVT_2403002A_327.dllGet hashmaliciousWannacryBrowse
                              • 103.224.212.215
                              yrBA01LVo2.exeGet hashmaliciousWannacryBrowse
                              • 103.224.212.215
                              lJt3mQqCQl.dllGet hashmaliciousWannacryBrowse
                              • 103.224.212.220
                              xIwkOnjSIa.dllGet hashmaliciousWannacryBrowse
                              • 103.224.212.220
                              IU28r0EZFA.dllGet hashmaliciousWannacryBrowse
                              • 103.224.212.220
                              ViNIRfmQmE.dllGet hashmaliciousWannacryBrowse
                              • 103.224.212.220
                              Ee3RWj3ID9.exeGet hashmaliciousWannacryBrowse
                              • 103.224.212.220
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              T-HTCroatianTelecomIncHR6.elfGet hashmaliciousUnknownBrowse
                              • 93.141.40.169
                              res.arm5.elfGet hashmaliciousUnknownBrowse
                              • 78.0.237.186
                              sora.mips.elfGet hashmaliciousUnknownBrowse
                              • 78.3.131.207
                              sora.x86.elfGet hashmaliciousUnknownBrowse
                              • 195.29.126.42
                              loligang.mips.elfGet hashmaliciousMiraiBrowse
                              • 195.29.31.181
                              kwari.ppc.elfGet hashmaliciousUnknownBrowse
                              • 93.143.8.37
                              db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                              • 195.29.126.41
                              mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 93.143.203.157
                              mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 78.2.254.54
                              3.elfGet hashmaliciousUnknownBrowse
                              • 195.29.114.43
                              OVHFRDebh Payment Detail.htmlGet hashmaliciousUnknownBrowse
                              • 167.114.158.15
                              Debh Payment Detail.htmlGet hashmaliciousUnknownBrowse
                              • 167.114.158.15
                              http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                              • 51.38.120.206
                              https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                              • 51.255.30.108
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 54.37.53.121
                              Employee_Salary_Update.docxGet hashmaliciousUnknownBrowse
                              • 158.69.4.253
                              x86_64.elfGet hashmaliciousUnknownBrowse
                              • 51.161.74.225
                              http://nkomm.frGet hashmaliciousUnknownBrowse
                              • 54.38.81.29
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 178.32.95.240
                              XCnB8SL.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 51.195.188.103
                              OVHFRDebh Payment Detail.htmlGet hashmaliciousUnknownBrowse
                              • 167.114.158.15
                              Debh Payment Detail.htmlGet hashmaliciousUnknownBrowse
                              • 167.114.158.15
                              http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                              • 51.38.120.206
                              https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                              • 51.255.30.108
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 54.37.53.121
                              Employee_Salary_Update.docxGet hashmaliciousUnknownBrowse
                              • 158.69.4.253
                              x86_64.elfGet hashmaliciousUnknownBrowse
                              • 51.161.74.225
                              http://nkomm.frGet hashmaliciousUnknownBrowse
                              • 54.38.81.29
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 178.32.95.240
                              XCnB8SL.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 51.195.188.103
                              No context
                              No context
                              Process:C:\Windows\mssecsvr.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):2061938
                              Entropy (8bit):3.7167484699496227
                              Encrypted:false
                              SSDEEP:12288:nti62ybaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjE:tihdmMSirYbcMNgef0QeQ
                              MD5:65CF699CF39A752B41CF1E8E65B5F266
                              SHA1:8AF1168060889ADE54761B919BF7A92F4D493C14
                              SHA-256:D1392B4DD1435469C9B8521137F25EDEAB8A898877440EEEF1CCAF06B77FD1CC
                              SHA-512:8A05F1A86722481E14D1919C15DFB33B845C93841BCDEE5CAB494C54FD1B91EBB75CD89264BCBCF8E9FA8E7789AB1669A20DE82B8C4EF8518D0931162FE62D9C
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 82%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\rundll32.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):2281472
                              Entropy (8bit):3.9912331660440397
                              Encrypted:false
                              SSDEEP:12288:e1bLgmluCti62ybaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjE:QbLgurihdmMSirYbcMNgef0QeQ
                              MD5:E12B5051C561A8E11FFF28902B1A9A70
                              SHA1:28074BFBC7A08B45DC134808A49784FA73C2820F
                              SHA-256:7BA6868C4B2F526B9B171E6518AC1C7434BB89548424482F3472C9EF480D2F41
                              SHA-512:B6E019B0A4159C3FAD03E80A48B82AB603FB81D654DE6559836C47A5BDF0E41F6EC7770744A146AA34CCE8E72FE5E0F133732CAB5F24FB0895C120A5C2F6D6C9
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 93%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L......................"...................@...........................P......................................................1..z...........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc.........1...... ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\mssecsvr.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):2061938
                              Entropy (8bit):3.7167484699496227
                              Encrypted:false
                              SSDEEP:12288:nti62ybaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjE:tihdmMSirYbcMNgef0QeQ
                              MD5:65CF699CF39A752B41CF1E8E65B5F266
                              SHA1:8AF1168060889ADE54761B919BF7A92F4D493C14
                              SHA-256:D1392B4DD1435469C9B8521137F25EDEAB8A898877440EEEF1CCAF06B77FD1CC
                              SHA-512:8A05F1A86722481E14D1919C15DFB33B845C93841BCDEE5CAB494C54FD1B91EBB75CD89264BCBCF8E9FA8E7789AB1669A20DE82B8C4EF8518D0931162FE62D9C
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 82%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):1.9620049107411335
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:mlfk8sYaiy.dll
                              File size:5'267'459 bytes
                              MD5:4662b44e2534901aba780e2e601e8012
                              SHA1:c30d623fe679bfd3fd33c32dbd795a44f5a5c55e
                              SHA256:62c9a15ea404a7c537028bcabcb5753c0e6c535981c38eef417e6db0611f3eb7
                              SHA512:4790f637b2df31bbc12fb36f00f197a9c08ae55cd26519f2054ef2b79eb824f80b7a746b9816d2adcf4ef8336f6025a8cafef4bbc065e412728c989a489756f4
                              SSDEEP:12288:T1bLgmluCti62ybaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjE:RbLgurihdmMSirYbcMNgef0QeQ
                              TLSH:8636239676AC91F8C21A6270E4774A21F2B73C7D21BD970FEB908A211C03791BB64F57
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                              Icon Hash:7ae282899bbab082
                              Entrypoint:0x100011e9
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                              DLL Characteristics:
                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                              Instruction
                              push ebp
                              mov ebp, esp
                              push ebx
                              mov ebx, dword ptr [ebp+08h]
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              push edi
                              mov edi, dword ptr [ebp+10h]
                              test esi, esi
                              jne 00007F6C9524442Bh
                              cmp dword ptr [10003140h], 00000000h
                              jmp 00007F6C95244448h
                              cmp esi, 01h
                              je 00007F6C95244427h
                              cmp esi, 02h
                              jne 00007F6C95244444h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F6C9524442Bh
                              push edi
                              push esi
                              push ebx
                              call eax
                              test eax, eax
                              je 00007F6C9524442Eh
                              push edi
                              push esi
                              push ebx
                              call 00007F6C9524433Ah
                              test eax, eax
                              jne 00007F6C95244426h
                              xor eax, eax
                              jmp 00007F6C95244470h
                              push edi
                              push esi
                              push ebx
                              call 00007F6C952441ECh
                              cmp esi, 01h
                              mov dword ptr [ebp+0Ch], eax
                              jne 00007F6C9524442Eh
                              test eax, eax
                              jne 00007F6C95244459h
                              push edi
                              push eax
                              push ebx
                              call 00007F6C95244316h
                              test esi, esi
                              je 00007F6C95244427h
                              cmp esi, 03h
                              jne 00007F6C95244448h
                              push edi
                              push esi
                              push ebx
                              call 00007F6C95244305h
                              test eax, eax
                              jne 00007F6C95244425h
                              and dword ptr [ebp+0Ch], eax
                              cmp dword ptr [ebp+0Ch], 00000000h
                              je 00007F6C95244433h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F6C9524442Ah
                              push edi
                              push esi
                              push ebx
                              call eax
                              mov dword ptr [ebp+0Ch], eax
                              mov eax, dword ptr [ebp+0Ch]
                              pop edi
                              pop esi
                              pop ebx
                              pop ebp
                              retn 000Ch
                              jmp dword ptr [10002028h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              Programming Language:
                              • [ C ] VS98 (6.0) build 8168
                              • [C++] VS98 (6.0) build 8168
                              • [RES] VS98 (6.0) cvtres build 1720
                              • [LNK] VS98 (6.0) imp/exp build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x40000x5000600x501000ac7ea315149ef438c6bd259493c35d1dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              W0x40600x500000dataEnglishUnited States0.7769136428833008
                              DLLImport
                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                              NameOrdinalAddress
                              PlayGame10x10001114
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-14T21:03:28.144912+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.4509911.1.1.153UDP
                              2025-01-14T21:03:29.054224+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730103.224.212.21580TCP
                              2025-01-14T21:03:30.914583+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449732103.224.212.21580TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 21:03:27.324018955 CET49675443192.168.2.4173.222.162.32
                              Jan 14, 2025 21:03:28.463871956 CET4973080192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:28.468852043 CET8049730103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:28.468959093 CET4973080192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:28.469108105 CET4973080192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:28.473911047 CET8049730103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:29.054085970 CET8049730103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:29.054155111 CET8049730103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:29.054224014 CET4973080192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:29.054270983 CET4973080192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:29.063263893 CET4973080192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:29.068098068 CET8049730103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:29.563410044 CET4973180192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:29.568428040 CET8049731199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:29.568537951 CET4973180192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:29.568738937 CET4973180192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:29.573574066 CET8049731199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:30.026355028 CET8049731199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:30.026376009 CET8049731199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:30.026607990 CET4973180192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:30.031991005 CET4973180192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:30.032052040 CET4973180192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:30.288085938 CET4973280192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:30.293649912 CET8049732103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:30.293721914 CET4973280192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:30.296466112 CET4973280192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:30.301285982 CET8049732103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:30.914510012 CET8049732103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:30.914582968 CET4973280192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:30.914632082 CET8049732103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:30.914680004 CET4973280192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:30.929559946 CET4973280192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:30.931292057 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:30.934494972 CET8049732103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:30.936372995 CET8049733199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:30.936475992 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:30.936599970 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:30.941695929 CET8049733199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:31.063210964 CET4973480192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:31.068166971 CET8049734103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:31.068788052 CET4973480192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:31.068949938 CET4973480192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:31.073745012 CET8049734103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:31.401421070 CET8049733199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:31.401504993 CET8049733199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:31.401509047 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.401619911 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.410132885 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.411340952 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.415204048 CET8049733199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:31.415352106 CET4973380192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.450229883 CET49735445192.168.2.4148.126.233.161
                              Jan 14, 2025 21:03:31.455049992 CET44549735148.126.233.161192.168.2.4
                              Jan 14, 2025 21:03:31.455163002 CET49735445192.168.2.4148.126.233.161
                              Jan 14, 2025 21:03:31.455185890 CET49735445192.168.2.4148.126.233.161
                              Jan 14, 2025 21:03:31.457360983 CET49736445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.460170984 CET44549735148.126.233.161192.168.2.4
                              Jan 14, 2025 21:03:31.460216045 CET49735445192.168.2.4148.126.233.161
                              Jan 14, 2025 21:03:31.462215900 CET44549736148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:31.462291956 CET49736445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.463572979 CET49736445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.468369007 CET44549736148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:31.468422890 CET49736445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.472703934 CET49737445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.477566004 CET44549737148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:31.477693081 CET49737445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.477694035 CET49737445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:31.482743025 CET44549737148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:31.673543930 CET8049734103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:31.673656940 CET4973480192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:31.673672915 CET8049734103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:31.673726082 CET4973480192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:31.676398039 CET4973480192.168.2.4103.224.212.215
                              Jan 14, 2025 21:03:31.678354025 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.681200027 CET8049734103.224.212.215192.168.2.4
                              Jan 14, 2025 21:03:31.683192968 CET8049744199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:31.683336020 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.683603048 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:31.688358068 CET8049744199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:32.166584969 CET8049744199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:32.166608095 CET8049744199.59.243.228192.168.2.4
                              Jan 14, 2025 21:03:32.166762114 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:32.166762114 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:32.177264929 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:32.177419901 CET4974480192.168.2.4199.59.243.228
                              Jan 14, 2025 21:03:33.450926065 CET49761445192.168.2.417.207.165.90
                              Jan 14, 2025 21:03:33.455869913 CET4454976117.207.165.90192.168.2.4
                              Jan 14, 2025 21:03:33.455976963 CET49761445192.168.2.417.207.165.90
                              Jan 14, 2025 21:03:33.456054926 CET49761445192.168.2.417.207.165.90
                              Jan 14, 2025 21:03:33.456286907 CET49762445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.461049080 CET4454976217.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:33.461116076 CET49762445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.461143017 CET49762445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.461158037 CET4454976117.207.165.90192.168.2.4
                              Jan 14, 2025 21:03:33.461211920 CET49761445192.168.2.417.207.165.90
                              Jan 14, 2025 21:03:33.462383032 CET49763445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.466093063 CET4454976217.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:33.466185093 CET49762445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.467175007 CET4454976317.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:33.467243910 CET49763445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.467297077 CET49763445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:33.472096920 CET4454976317.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:35.466197968 CET49786445192.168.2.451.178.254.227
                              Jan 14, 2025 21:03:35.471049070 CET4454978651.178.254.227192.168.2.4
                              Jan 14, 2025 21:03:35.471138000 CET49786445192.168.2.451.178.254.227
                              Jan 14, 2025 21:03:35.471216917 CET49786445192.168.2.451.178.254.227
                              Jan 14, 2025 21:03:35.471442938 CET49787445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.476195097 CET4454978651.178.254.227192.168.2.4
                              Jan 14, 2025 21:03:35.476273060 CET4454978751.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:35.476334095 CET49787445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.476377010 CET49787445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.477479935 CET49788445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.477567911 CET4454978651.178.254.227192.168.2.4
                              Jan 14, 2025 21:03:35.478980064 CET49786445192.168.2.451.178.254.227
                              Jan 14, 2025 21:03:35.481296062 CET4454978751.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:35.481359959 CET49787445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.482279062 CET4454978851.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:35.482342005 CET49788445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.482415915 CET49788445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:35.487173080 CET4454978851.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:37.481443882 CET49811445192.168.2.4197.203.23.202
                              Jan 14, 2025 21:03:37.486295938 CET44549811197.203.23.202192.168.2.4
                              Jan 14, 2025 21:03:37.486392021 CET49811445192.168.2.4197.203.23.202
                              Jan 14, 2025 21:03:37.486392021 CET49811445192.168.2.4197.203.23.202
                              Jan 14, 2025 21:03:37.486586094 CET49812445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.491391897 CET44549812197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:37.491475105 CET49812445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.491489887 CET44549811197.203.23.202192.168.2.4
                              Jan 14, 2025 21:03:37.491499901 CET49812445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.491575956 CET49811445192.168.2.4197.203.23.202
                              Jan 14, 2025 21:03:37.492537975 CET49813445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.497222900 CET44549812197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:37.497279882 CET49812445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.497313976 CET44549813197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:37.497380018 CET49813445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.497421980 CET49813445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:37.502157927 CET44549813197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:39.270709991 CET44549813197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:39.270858049 CET49813445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:39.270858049 CET49813445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:39.270931005 CET49813445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:39.276161909 CET44549813197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:39.276181936 CET44549813197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:39.497119904 CET49835445192.168.2.47.204.138.14
                              Jan 14, 2025 21:03:39.502100945 CET445498357.204.138.14192.168.2.4
                              Jan 14, 2025 21:03:39.502181053 CET49835445192.168.2.47.204.138.14
                              Jan 14, 2025 21:03:39.502255917 CET49835445192.168.2.47.204.138.14
                              Jan 14, 2025 21:03:39.502482891 CET49837445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.507246971 CET445498357.204.138.14192.168.2.4
                              Jan 14, 2025 21:03:39.507302999 CET49835445192.168.2.47.204.138.14
                              Jan 14, 2025 21:03:39.507358074 CET445498377.204.138.1192.168.2.4
                              Jan 14, 2025 21:03:39.507430077 CET49837445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.507523060 CET49837445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.508609056 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.513400078 CET445498377.204.138.1192.168.2.4
                              Jan 14, 2025 21:03:39.513463020 CET49837445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.514187098 CET445498387.204.138.1192.168.2.4
                              Jan 14, 2025 21:03:39.514259100 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.514305115 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:03:39.520148039 CET445498387.204.138.1192.168.2.4
                              Jan 14, 2025 21:03:41.546792984 CET49860445192.168.2.427.44.253.47
                              Jan 14, 2025 21:03:41.551672935 CET4454986027.44.253.47192.168.2.4
                              Jan 14, 2025 21:03:41.552092075 CET49860445192.168.2.427.44.253.47
                              Jan 14, 2025 21:03:41.552165985 CET49860445192.168.2.427.44.253.47
                              Jan 14, 2025 21:03:41.552346945 CET49861445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.557168007 CET4454986127.44.253.1192.168.2.4
                              Jan 14, 2025 21:03:41.557194948 CET4454986027.44.253.47192.168.2.4
                              Jan 14, 2025 21:03:41.557218075 CET49861445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.557248116 CET49860445192.168.2.427.44.253.47
                              Jan 14, 2025 21:03:41.559505939 CET49861445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.563662052 CET49862445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.564373970 CET4454986127.44.253.1192.168.2.4
                              Jan 14, 2025 21:03:41.564425945 CET49861445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.568449974 CET4454986227.44.253.1192.168.2.4
                              Jan 14, 2025 21:03:41.568770885 CET49862445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.571150064 CET49862445192.168.2.427.44.253.1
                              Jan 14, 2025 21:03:41.578614950 CET4454986227.44.253.1192.168.2.4
                              Jan 14, 2025 21:03:42.277409077 CET49871445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:42.282417059 CET44549871197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:42.282506943 CET49871445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:42.282569885 CET49871445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:42.287365913 CET44549871197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:43.543260098 CET49886445192.168.2.419.72.220.15
                              Jan 14, 2025 21:03:43.548064947 CET4454988619.72.220.15192.168.2.4
                              Jan 14, 2025 21:03:43.548135996 CET49886445192.168.2.419.72.220.15
                              Jan 14, 2025 21:03:43.548201084 CET49886445192.168.2.419.72.220.15
                              Jan 14, 2025 21:03:43.548374891 CET49887445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.553081036 CET4454988619.72.220.15192.168.2.4
                              Jan 14, 2025 21:03:43.553128958 CET49886445192.168.2.419.72.220.15
                              Jan 14, 2025 21:03:43.553189039 CET4454988719.72.220.1192.168.2.4
                              Jan 14, 2025 21:03:43.553268909 CET49887445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.553268909 CET49887445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.553534985 CET49888445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.558403969 CET4454988719.72.220.1192.168.2.4
                              Jan 14, 2025 21:03:43.558422089 CET4454988819.72.220.1192.168.2.4
                              Jan 14, 2025 21:03:43.558456898 CET49887445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.558506966 CET49888445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.558506966 CET49888445192.168.2.419.72.220.1
                              Jan 14, 2025 21:03:43.563308001 CET4454988819.72.220.1192.168.2.4
                              Jan 14, 2025 21:03:44.036552906 CET44549871197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:44.038902998 CET49871445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:44.040544033 CET49871445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:44.040601969 CET49871445192.168.2.4197.203.23.1
                              Jan 14, 2025 21:03:44.045428038 CET44549871197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:44.045459986 CET44549871197.203.23.1192.168.2.4
                              Jan 14, 2025 21:03:44.117950916 CET49896445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.123279095 CET44549896197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:44.123466969 CET49896445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.123466969 CET49896445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.123799086 CET49898445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.128622055 CET44549898197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:44.128704071 CET49898445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.128859997 CET44549896197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:44.130805016 CET49896445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.130919933 CET49898445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:44.135687113 CET44549898197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:45.558918953 CET49912445192.168.2.4172.230.50.208
                              Jan 14, 2025 21:03:45.563925028 CET44549912172.230.50.208192.168.2.4
                              Jan 14, 2025 21:03:45.567418098 CET49912445192.168.2.4172.230.50.208
                              Jan 14, 2025 21:03:45.567542076 CET49912445192.168.2.4172.230.50.208
                              Jan 14, 2025 21:03:45.567709923 CET49913445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.572386980 CET44549912172.230.50.208192.168.2.4
                              Jan 14, 2025 21:03:45.572506905 CET44549913172.230.50.1192.168.2.4
                              Jan 14, 2025 21:03:45.572680950 CET49912445192.168.2.4172.230.50.208
                              Jan 14, 2025 21:03:45.572716951 CET49913445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.572771072 CET49913445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.573050976 CET49914445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.577728033 CET44549913172.230.50.1192.168.2.4
                              Jan 14, 2025 21:03:45.577872038 CET44549914172.230.50.1192.168.2.4
                              Jan 14, 2025 21:03:45.577943087 CET49913445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.577977896 CET49914445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.578016043 CET49914445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:03:45.582832098 CET44549914172.230.50.1192.168.2.4
                              Jan 14, 2025 21:03:45.858201981 CET44549898197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:45.858310938 CET49898445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:45.858355999 CET49898445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:45.858433962 CET49898445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:45.864475012 CET44549898197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:45.864640951 CET44549898197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:47.574594021 CET49937445192.168.2.415.181.139.109
                              Jan 14, 2025 21:03:47.579372883 CET4454993715.181.139.109192.168.2.4
                              Jan 14, 2025 21:03:47.579479933 CET49937445192.168.2.415.181.139.109
                              Jan 14, 2025 21:03:47.579479933 CET49937445192.168.2.415.181.139.109
                              Jan 14, 2025 21:03:47.579626083 CET49938445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.584409952 CET4454993815.181.139.1192.168.2.4
                              Jan 14, 2025 21:03:47.584475994 CET49938445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.584492922 CET49938445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.584506989 CET4454993715.181.139.109192.168.2.4
                              Jan 14, 2025 21:03:47.584557056 CET49937445192.168.2.415.181.139.109
                              Jan 14, 2025 21:03:47.584784031 CET49939445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.589440107 CET4454993815.181.139.1192.168.2.4
                              Jan 14, 2025 21:03:47.589507103 CET49938445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.589598894 CET4454993915.181.139.1192.168.2.4
                              Jan 14, 2025 21:03:47.589653015 CET49939445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.589720011 CET49939445192.168.2.415.181.139.1
                              Jan 14, 2025 21:03:47.594491959 CET4454993915.181.139.1192.168.2.4
                              Jan 14, 2025 21:03:48.871222973 CET49953445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:48.876039982 CET44549953197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:48.876117945 CET49953445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:48.876164913 CET49953445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:48.880964041 CET44549953197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:49.590255022 CET49961445192.168.2.4155.185.174.106
                              Jan 14, 2025 21:03:49.595181942 CET44549961155.185.174.106192.168.2.4
                              Jan 14, 2025 21:03:49.595242023 CET49961445192.168.2.4155.185.174.106
                              Jan 14, 2025 21:03:49.595334053 CET49961445192.168.2.4155.185.174.106
                              Jan 14, 2025 21:03:49.595432043 CET49962445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.600186110 CET44549962155.185.174.1192.168.2.4
                              Jan 14, 2025 21:03:49.600244045 CET49962445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.600284100 CET44549961155.185.174.106192.168.2.4
                              Jan 14, 2025 21:03:49.600294113 CET44549961155.185.174.106192.168.2.4
                              Jan 14, 2025 21:03:49.600377083 CET49962445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.600402117 CET49961445192.168.2.4155.185.174.106
                              Jan 14, 2025 21:03:49.600656986 CET49963445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.605262995 CET44549962155.185.174.1192.168.2.4
                              Jan 14, 2025 21:03:49.605319023 CET49962445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.605429888 CET44549963155.185.174.1192.168.2.4
                              Jan 14, 2025 21:03:49.605489969 CET49963445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.605529070 CET49963445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:03:49.610312939 CET44549963155.185.174.1192.168.2.4
                              Jan 14, 2025 21:03:50.584050894 CET44549953197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:50.584212065 CET49953445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:50.590207100 CET49953445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:50.590260983 CET49953445192.168.2.4197.203.23.2
                              Jan 14, 2025 21:03:50.595068932 CET44549953197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:50.595081091 CET44549953197.203.23.2192.168.2.4
                              Jan 14, 2025 21:03:50.686439037 CET49975445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.692959070 CET44549975197.203.23.3192.168.2.4
                              Jan 14, 2025 21:03:50.693111897 CET49975445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.702748060 CET49975445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.703268051 CET49977445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.708758116 CET44549975197.203.23.3192.168.2.4
                              Jan 14, 2025 21:03:50.708883047 CET49975445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.709114075 CET44549977197.203.23.3192.168.2.4
                              Jan 14, 2025 21:03:50.709191084 CET49977445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.709224939 CET49977445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:03:50.714878082 CET44549977197.203.23.3192.168.2.4
                              Jan 14, 2025 21:03:51.215037107 CET4972480192.168.2.42.16.168.102
                              Jan 14, 2025 21:03:51.220587969 CET80497242.16.168.102192.168.2.4
                              Jan 14, 2025 21:03:51.220642090 CET4972480192.168.2.42.16.168.102
                              Jan 14, 2025 21:03:51.606612921 CET49988445192.168.2.493.140.22.189
                              Jan 14, 2025 21:03:51.611850977 CET4454998893.140.22.189192.168.2.4
                              Jan 14, 2025 21:03:51.611958027 CET49988445192.168.2.493.140.22.189
                              Jan 14, 2025 21:03:51.612481117 CET49988445192.168.2.493.140.22.189
                              Jan 14, 2025 21:03:51.612648010 CET49989445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.617402077 CET4454998993.140.22.1192.168.2.4
                              Jan 14, 2025 21:03:51.617502928 CET49989445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.617571115 CET4454998893.140.22.189192.168.2.4
                              Jan 14, 2025 21:03:51.617624044 CET49988445192.168.2.493.140.22.189
                              Jan 14, 2025 21:03:51.620377064 CET49989445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.620966911 CET49990445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.625214100 CET4454998993.140.22.1192.168.2.4
                              Jan 14, 2025 21:03:51.625288963 CET49989445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.625742912 CET4454999093.140.22.1192.168.2.4
                              Jan 14, 2025 21:03:51.625818014 CET49990445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.625991106 CET49990445192.168.2.493.140.22.1
                              Jan 14, 2025 21:03:51.630736113 CET4454999093.140.22.1192.168.2.4
                              Jan 14, 2025 21:03:52.850600004 CET44549737148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:52.851905107 CET49737445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:52.851993084 CET49737445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:52.852087021 CET49737445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:52.856873989 CET44549737148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:52.856884003 CET44549737148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:53.691019058 CET50011445192.168.2.439.74.29.188
                              Jan 14, 2025 21:03:53.695950031 CET4455001139.74.29.188192.168.2.4
                              Jan 14, 2025 21:03:53.696034908 CET50011445192.168.2.439.74.29.188
                              Jan 14, 2025 21:03:53.696110010 CET50011445192.168.2.439.74.29.188
                              Jan 14, 2025 21:03:53.696269989 CET50012445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.701214075 CET4455001139.74.29.188192.168.2.4
                              Jan 14, 2025 21:03:53.701248884 CET4455001239.74.29.1192.168.2.4
                              Jan 14, 2025 21:03:53.701298952 CET50011445192.168.2.439.74.29.188
                              Jan 14, 2025 21:03:53.701368093 CET50012445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.712743998 CET50012445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.717611074 CET4455001239.74.29.1192.168.2.4
                              Jan 14, 2025 21:03:53.717704058 CET50012445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.769309044 CET50013445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.774204016 CET4455001339.74.29.1192.168.2.4
                              Jan 14, 2025 21:03:53.774333954 CET50013445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.779685974 CET50013445192.168.2.439.74.29.1
                              Jan 14, 2025 21:03:53.784519911 CET4455001339.74.29.1192.168.2.4
                              Jan 14, 2025 21:03:54.832032919 CET4454976317.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:54.832333088 CET49763445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:54.832333088 CET49763445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:54.832333088 CET49763445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:54.837240934 CET4454976317.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:54.837255001 CET4454976317.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:55.699896097 CET50037445192.168.2.419.249.31.253
                              Jan 14, 2025 21:03:55.704782009 CET4455003719.249.31.253192.168.2.4
                              Jan 14, 2025 21:03:55.704895020 CET50037445192.168.2.419.249.31.253
                              Jan 14, 2025 21:03:55.705053091 CET50037445192.168.2.419.249.31.253
                              Jan 14, 2025 21:03:55.705348015 CET50038445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.710134029 CET4455003719.249.31.253192.168.2.4
                              Jan 14, 2025 21:03:55.710151911 CET4455003819.249.31.1192.168.2.4
                              Jan 14, 2025 21:03:55.710215092 CET50037445192.168.2.419.249.31.253
                              Jan 14, 2025 21:03:55.710237980 CET50038445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.710341930 CET50038445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.710772991 CET50039445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.715253115 CET4455003819.249.31.1192.168.2.4
                              Jan 14, 2025 21:03:55.715336084 CET50038445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.715595007 CET4455003919.249.31.1192.168.2.4
                              Jan 14, 2025 21:03:55.715657949 CET50039445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.715711117 CET50039445192.168.2.419.249.31.1
                              Jan 14, 2025 21:03:55.721273899 CET4455003919.249.31.1192.168.2.4
                              Jan 14, 2025 21:03:55.855576992 CET50041445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:55.860491991 CET44550041148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:55.860584974 CET50041445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:55.860611916 CET50041445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:03:55.865391016 CET44550041148.126.233.1192.168.2.4
                              Jan 14, 2025 21:03:56.864717960 CET4454978851.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:56.864795923 CET49788445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:56.864909887 CET49788445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:56.865009069 CET49788445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:56.869721889 CET4454978851.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:56.869772911 CET4454978851.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:57.715173960 CET50045445192.168.2.419.135.66.238
                              Jan 14, 2025 21:03:57.720127106 CET4455004519.135.66.238192.168.2.4
                              Jan 14, 2025 21:03:57.720218897 CET50045445192.168.2.419.135.66.238
                              Jan 14, 2025 21:03:57.720256090 CET50045445192.168.2.419.135.66.238
                              Jan 14, 2025 21:03:57.720351934 CET50046445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.725178957 CET4455004619.135.66.1192.168.2.4
                              Jan 14, 2025 21:03:57.725255013 CET50046445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.725279093 CET50046445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.725351095 CET4455004519.135.66.238192.168.2.4
                              Jan 14, 2025 21:03:57.725411892 CET50045445192.168.2.419.135.66.238
                              Jan 14, 2025 21:03:57.725734949 CET50047445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.730211973 CET4455004619.135.66.1192.168.2.4
                              Jan 14, 2025 21:03:57.730271101 CET50046445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.730577946 CET4455004719.135.66.1192.168.2.4
                              Jan 14, 2025 21:03:57.730648994 CET50047445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.730693102 CET50047445192.168.2.419.135.66.1
                              Jan 14, 2025 21:03:57.735467911 CET4455004719.135.66.1192.168.2.4
                              Jan 14, 2025 21:03:57.840063095 CET50048445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:57.844866991 CET4455004817.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:57.844940901 CET50048445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:57.845031023 CET50048445192.168.2.417.207.165.1
                              Jan 14, 2025 21:03:57.850749969 CET4455004817.207.165.1192.168.2.4
                              Jan 14, 2025 21:03:59.731040955 CET50049445192.168.2.4174.8.52.170
                              Jan 14, 2025 21:03:59.735888004 CET44550049174.8.52.170192.168.2.4
                              Jan 14, 2025 21:03:59.736044884 CET50049445192.168.2.4174.8.52.170
                              Jan 14, 2025 21:03:59.736088037 CET50049445192.168.2.4174.8.52.170
                              Jan 14, 2025 21:03:59.736313105 CET50050445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.741142035 CET44550049174.8.52.170192.168.2.4
                              Jan 14, 2025 21:03:59.741153002 CET44550050174.8.52.1192.168.2.4
                              Jan 14, 2025 21:03:59.741245031 CET50049445192.168.2.4174.8.52.170
                              Jan 14, 2025 21:03:59.741272926 CET50050445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.741324902 CET50050445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.742085934 CET50051445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.746311903 CET44550050174.8.52.1192.168.2.4
                              Jan 14, 2025 21:03:59.746361017 CET50050445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.746910095 CET44550051174.8.52.1192.168.2.4
                              Jan 14, 2025 21:03:59.747001886 CET50051445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.747001886 CET50051445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:03:59.751841068 CET44550051174.8.52.1192.168.2.4
                              Jan 14, 2025 21:03:59.871328115 CET50052445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:59.876187086 CET4455005251.178.254.1192.168.2.4
                              Jan 14, 2025 21:03:59.876341105 CET50052445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:59.876413107 CET50052445192.168.2.451.178.254.1
                              Jan 14, 2025 21:03:59.881280899 CET4455005251.178.254.1192.168.2.4
                              Jan 14, 2025 21:04:01.274308920 CET445498387.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:01.274399996 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:01.274465084 CET445498387.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:01.274511099 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:01.274650097 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:01.274650097 CET49838445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:01.284540892 CET445498387.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:01.284550905 CET445498387.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:01.746573925 CET50053445192.168.2.4206.149.19.247
                              Jan 14, 2025 21:04:01.754352093 CET44550053206.149.19.247192.168.2.4
                              Jan 14, 2025 21:04:01.754502058 CET50053445192.168.2.4206.149.19.247
                              Jan 14, 2025 21:04:01.754642963 CET50053445192.168.2.4206.149.19.247
                              Jan 14, 2025 21:04:01.754699945 CET50054445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.761269093 CET44550054206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:01.761334896 CET50054445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.761456013 CET44550053206.149.19.247192.168.2.4
                              Jan 14, 2025 21:04:01.761554956 CET50053445192.168.2.4206.149.19.247
                              Jan 14, 2025 21:04:01.761581898 CET50054445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.761882067 CET50055445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.768309116 CET44550055206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:01.768318892 CET44550054206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:01.768415928 CET50055445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.768418074 CET50054445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.768429041 CET50055445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:01.776168108 CET44550055206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:02.925215006 CET4454986227.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:02.925460100 CET49862445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:02.925460100 CET49862445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:02.927335978 CET49862445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:02.930289030 CET4454986227.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:02.932136059 CET4454986227.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:03.762119055 CET50056445192.168.2.430.53.7.75
                              Jan 14, 2025 21:04:03.767024040 CET4455005630.53.7.75192.168.2.4
                              Jan 14, 2025 21:04:03.767111063 CET50056445192.168.2.430.53.7.75
                              Jan 14, 2025 21:04:03.767246008 CET50056445192.168.2.430.53.7.75
                              Jan 14, 2025 21:04:03.767436981 CET50057445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.771990061 CET4455005630.53.7.75192.168.2.4
                              Jan 14, 2025 21:04:03.772046089 CET50056445192.168.2.430.53.7.75
                              Jan 14, 2025 21:04:03.772289991 CET4455005730.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:03.772351027 CET50057445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.772429943 CET50057445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.772674084 CET50058445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.777333021 CET4455005730.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:03.777384996 CET50057445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.777493954 CET4455005830.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:03.777549982 CET50058445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.777579069 CET50058445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:03.782324076 CET4455005830.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:04.277633905 CET50059445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:04.282476902 CET445500597.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:04.282565117 CET50059445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:04.282602072 CET50059445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:04.287384987 CET445500597.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:04.925964117 CET4454988819.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:04.926150084 CET49888445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:04.926186085 CET49888445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:04.926224947 CET49888445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:04.931360960 CET4454988819.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:04.931458950 CET4454988819.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:05.777834892 CET50060445192.168.2.476.215.58.166
                              Jan 14, 2025 21:04:05.782846928 CET4455006076.215.58.166192.168.2.4
                              Jan 14, 2025 21:04:05.782983065 CET50060445192.168.2.476.215.58.166
                              Jan 14, 2025 21:04:05.783093929 CET50060445192.168.2.476.215.58.166
                              Jan 14, 2025 21:04:05.783344030 CET50061445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.789566994 CET4455006176.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:05.789658070 CET50061445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.789732933 CET50061445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.790014982 CET50062445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.790088892 CET4455006076.215.58.166192.168.2.4
                              Jan 14, 2025 21:04:05.790148020 CET50060445192.168.2.476.215.58.166
                              Jan 14, 2025 21:04:05.795593977 CET4455006176.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:05.795711994 CET50061445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.795916080 CET4455006276.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:05.795988083 CET50062445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.796047926 CET50062445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:05.801315069 CET4455006276.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:05.933732986 CET50063445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:05.938668966 CET4455006327.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:05.938781977 CET50063445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:05.938889027 CET50063445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:05.943692923 CET4455006327.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:06.956482887 CET44549914172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:06.956684113 CET49914445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:06.956684113 CET49914445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:06.956789970 CET49914445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:06.961612940 CET44549914172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:06.961622953 CET44549914172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:07.653012991 CET50064445192.168.2.43.121.48.189
                              Jan 14, 2025 21:04:07.657847881 CET445500643.121.48.189192.168.2.4
                              Jan 14, 2025 21:04:07.657984018 CET50064445192.168.2.43.121.48.189
                              Jan 14, 2025 21:04:07.658157110 CET50064445192.168.2.43.121.48.189
                              Jan 14, 2025 21:04:07.658422947 CET50065445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.662944078 CET445500643.121.48.189192.168.2.4
                              Jan 14, 2025 21:04:07.663047075 CET50064445192.168.2.43.121.48.189
                              Jan 14, 2025 21:04:07.663423061 CET445500653.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:07.663611889 CET50065445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.663732052 CET50065445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.664086103 CET50066445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.668490887 CET445500653.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:07.668586016 CET50065445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.668875933 CET445500663.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:07.668936968 CET50066445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.668972015 CET50066445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:07.673688889 CET445500663.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:07.940498114 CET50067445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:07.945295095 CET4455006719.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:07.945353985 CET50067445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:07.953383923 CET50067445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:07.958117008 CET4455006719.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:08.978070974 CET4454993915.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:08.978291988 CET49939445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:08.978420973 CET49939445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:08.978420973 CET49939445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:08.983310938 CET4454993915.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:08.983325958 CET4454993915.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:09.403115988 CET50068445192.168.2.448.100.13.147
                              Jan 14, 2025 21:04:09.407948017 CET4455006848.100.13.147192.168.2.4
                              Jan 14, 2025 21:04:09.410893917 CET50068445192.168.2.448.100.13.147
                              Jan 14, 2025 21:04:09.410893917 CET50068445192.168.2.448.100.13.147
                              Jan 14, 2025 21:04:09.411063910 CET50069445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:09.415787935 CET4455006948.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:09.415915966 CET4455006848.100.13.147192.168.2.4
                              Jan 14, 2025 21:04:09.416003942 CET50068445192.168.2.448.100.13.147
                              Jan 14, 2025 21:04:09.416009903 CET50069445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:09.416362047 CET50070445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:09.421046972 CET4455006948.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:09.421204090 CET4455007048.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:09.421264887 CET50069445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:09.421300888 CET50070445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:09.421361923 CET50070445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:09.426095009 CET4455007048.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:09.964996099 CET50071445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:09.969871044 CET44550071172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:09.969942093 CET50071445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:09.969984055 CET50071445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:09.974778891 CET44550071172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:10.989974976 CET44549963155.185.174.1192.168.2.4
                              Jan 14, 2025 21:04:10.990164995 CET49963445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:10.990164995 CET49963445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:10.990164995 CET49963445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:10.995134115 CET44549963155.185.174.1192.168.2.4
                              Jan 14, 2025 21:04:10.995167017 CET44549963155.185.174.1192.168.2.4
                              Jan 14, 2025 21:04:11.043293953 CET50072445192.168.2.4106.197.232.186
                              Jan 14, 2025 21:04:11.048183918 CET44550072106.197.232.186192.168.2.4
                              Jan 14, 2025 21:04:11.048276901 CET50072445192.168.2.4106.197.232.186
                              Jan 14, 2025 21:04:11.048316002 CET50072445192.168.2.4106.197.232.186
                              Jan 14, 2025 21:04:11.048499107 CET50073445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.053276062 CET44550072106.197.232.186192.168.2.4
                              Jan 14, 2025 21:04:11.053312063 CET44550073106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:11.053350925 CET50072445192.168.2.4106.197.232.186
                              Jan 14, 2025 21:04:11.053384066 CET50073445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.053466082 CET50073445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.053709030 CET50074445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.058511019 CET44550073106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:11.058543921 CET44550074106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:11.058624029 CET50073445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.058667898 CET50074445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.058686972 CET50074445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:11.063559055 CET44550074106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:11.980484962 CET50075445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:11.985398054 CET4455007515.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:11.985471010 CET50075445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:11.985517025 CET50075445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:11.990619898 CET4455007515.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:12.082618952 CET44549977197.203.23.3192.168.2.4
                              Jan 14, 2025 21:04:12.082715034 CET49977445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:12.082742929 CET49977445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:12.082817078 CET49977445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:12.088674068 CET44549977197.203.23.3192.168.2.4
                              Jan 14, 2025 21:04:12.089013100 CET44549977197.203.23.3192.168.2.4
                              Jan 14, 2025 21:04:12.574831009 CET50076445192.168.2.4119.29.17.242
                              Jan 14, 2025 21:04:12.579632044 CET44550076119.29.17.242192.168.2.4
                              Jan 14, 2025 21:04:12.579700947 CET50076445192.168.2.4119.29.17.242
                              Jan 14, 2025 21:04:12.579801083 CET50076445192.168.2.4119.29.17.242
                              Jan 14, 2025 21:04:12.579952002 CET50077445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.584760904 CET44550077119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:12.584824085 CET50077445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.584847927 CET50077445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.584851027 CET44550076119.29.17.242192.168.2.4
                              Jan 14, 2025 21:04:12.584897041 CET50076445192.168.2.4119.29.17.242
                              Jan 14, 2025 21:04:12.585222960 CET50078445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.589737892 CET44550077119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:12.589790106 CET50077445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.590060949 CET44550078119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:12.590121031 CET50078445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.590164900 CET50078445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:12.594950914 CET44550078119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:13.024991989 CET4454999093.140.22.1192.168.2.4
                              Jan 14, 2025 21:04:13.025149107 CET49990445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:13.025176048 CET49990445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:13.025249958 CET49990445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:13.029988050 CET4454999093.140.22.1192.168.2.4
                              Jan 14, 2025 21:04:13.030002117 CET4454999093.140.22.1192.168.2.4
                              Jan 14, 2025 21:04:13.996215105 CET50080445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:13.996709108 CET50081445192.168.2.4176.153.185.129
                              Jan 14, 2025 21:04:14.001130104 CET44550080155.185.174.1192.168.2.4
                              Jan 14, 2025 21:04:14.001209974 CET50080445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:14.001249075 CET50080445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:14.001931906 CET44550081176.153.185.129192.168.2.4
                              Jan 14, 2025 21:04:14.001987934 CET50081445192.168.2.4176.153.185.129
                              Jan 14, 2025 21:04:14.002017975 CET50081445192.168.2.4176.153.185.129
                              Jan 14, 2025 21:04:14.002137899 CET50082445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.006025076 CET44550080155.185.174.1192.168.2.4
                              Jan 14, 2025 21:04:14.006906033 CET44550082176.153.185.1192.168.2.4
                              Jan 14, 2025 21:04:14.006973982 CET50082445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.007003069 CET50082445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.007004976 CET44550081176.153.185.129192.168.2.4
                              Jan 14, 2025 21:04:14.007059097 CET50081445192.168.2.4176.153.185.129
                              Jan 14, 2025 21:04:14.007338047 CET50083445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.011986971 CET44550082176.153.185.1192.168.2.4
                              Jan 14, 2025 21:04:14.012053967 CET50082445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.012224913 CET44550083176.153.185.1192.168.2.4
                              Jan 14, 2025 21:04:14.012315035 CET50083445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.012358904 CET50083445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:14.017136097 CET44550083176.153.185.1192.168.2.4
                              Jan 14, 2025 21:04:15.089901924 CET50089445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:15.094892025 CET44550089197.203.23.3192.168.2.4
                              Jan 14, 2025 21:04:15.095061064 CET50089445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:15.095118999 CET50089445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:15.099937916 CET44550089197.203.23.3192.168.2.4
                              Jan 14, 2025 21:04:15.161516905 CET4455001339.74.29.1192.168.2.4
                              Jan 14, 2025 21:04:15.161588907 CET50013445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:15.161664009 CET50013445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:15.161725044 CET50013445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:15.166398048 CET4455001339.74.29.1192.168.2.4
                              Jan 14, 2025 21:04:15.166462898 CET4455001339.74.29.1192.168.2.4
                              Jan 14, 2025 21:04:15.324598074 CET50090445192.168.2.4152.209.52.89
                              Jan 14, 2025 21:04:15.329412937 CET44550090152.209.52.89192.168.2.4
                              Jan 14, 2025 21:04:15.329523087 CET50090445192.168.2.4152.209.52.89
                              Jan 14, 2025 21:04:15.329533100 CET50090445192.168.2.4152.209.52.89
                              Jan 14, 2025 21:04:15.329700947 CET50091445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.334460974 CET44550090152.209.52.89192.168.2.4
                              Jan 14, 2025 21:04:15.334482908 CET44550091152.209.52.1192.168.2.4
                              Jan 14, 2025 21:04:15.334527969 CET50090445192.168.2.4152.209.52.89
                              Jan 14, 2025 21:04:15.334562063 CET50091445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.334614038 CET50091445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.334950924 CET50092445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.339488983 CET44550091152.209.52.1192.168.2.4
                              Jan 14, 2025 21:04:15.339545012 CET50091445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.339783907 CET44550092152.209.52.1192.168.2.4
                              Jan 14, 2025 21:04:15.339862108 CET50092445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.339880943 CET50092445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:15.344722986 CET44550092152.209.52.1192.168.2.4
                              Jan 14, 2025 21:04:16.027426958 CET50098445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:16.032206059 CET4455009893.140.22.1192.168.2.4
                              Jan 14, 2025 21:04:16.032280922 CET50098445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:16.032320023 CET50098445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:16.037014008 CET4455009893.140.22.1192.168.2.4
                              Jan 14, 2025 21:04:16.559345007 CET50104445192.168.2.4135.107.147.114
                              Jan 14, 2025 21:04:16.564222097 CET44550104135.107.147.114192.168.2.4
                              Jan 14, 2025 21:04:16.564466953 CET50104445192.168.2.4135.107.147.114
                              Jan 14, 2025 21:04:16.564661980 CET50104445192.168.2.4135.107.147.114
                              Jan 14, 2025 21:04:16.564990044 CET50105445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.569489956 CET44550104135.107.147.114192.168.2.4
                              Jan 14, 2025 21:04:16.569572926 CET50104445192.168.2.4135.107.147.114
                              Jan 14, 2025 21:04:16.569782019 CET44550105135.107.147.1192.168.2.4
                              Jan 14, 2025 21:04:16.569852114 CET50105445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.569875956 CET50105445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.570144892 CET50106445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.574974060 CET44550105135.107.147.1192.168.2.4
                              Jan 14, 2025 21:04:16.574982882 CET44550106135.107.147.1192.168.2.4
                              Jan 14, 2025 21:04:16.575042963 CET50105445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.575095892 CET50106445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.575119972 CET50106445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:16.579894066 CET44550106135.107.147.1192.168.2.4
                              Jan 14, 2025 21:04:17.102432013 CET4455003919.249.31.1192.168.2.4
                              Jan 14, 2025 21:04:17.102556944 CET50039445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:17.102607965 CET50039445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:17.102657080 CET50039445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:17.108335018 CET4455003919.249.31.1192.168.2.4
                              Jan 14, 2025 21:04:17.108346939 CET4455003919.249.31.1192.168.2.4
                              Jan 14, 2025 21:04:17.257327080 CET44550041148.126.233.1192.168.2.4
                              Jan 14, 2025 21:04:17.257397890 CET50041445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:04:17.257484913 CET50041445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:04:17.257558107 CET50041445192.168.2.4148.126.233.1
                              Jan 14, 2025 21:04:17.262365103 CET44550041148.126.233.1192.168.2.4
                              Jan 14, 2025 21:04:17.262376070 CET44550041148.126.233.1192.168.2.4
                              Jan 14, 2025 21:04:17.308778048 CET50112445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.313556910 CET44550112148.126.233.2192.168.2.4
                              Jan 14, 2025 21:04:17.313724041 CET50112445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.313724041 CET50112445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.313996077 CET50113445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.318732977 CET44550113148.126.233.2192.168.2.4
                              Jan 14, 2025 21:04:17.318793058 CET50113445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.318809986 CET50113445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.318891048 CET44550112148.126.233.2192.168.2.4
                              Jan 14, 2025 21:04:17.318938971 CET50112445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:17.323571920 CET44550113148.126.233.2192.168.2.4
                              Jan 14, 2025 21:04:17.715228081 CET50114445192.168.2.485.26.53.136
                              Jan 14, 2025 21:04:17.720098019 CET4455011485.26.53.136192.168.2.4
                              Jan 14, 2025 21:04:17.720185995 CET50114445192.168.2.485.26.53.136
                              Jan 14, 2025 21:04:17.720206022 CET50114445192.168.2.485.26.53.136
                              Jan 14, 2025 21:04:17.720293999 CET50115445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.725049019 CET4455011585.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:17.725106955 CET50115445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.725136042 CET50115445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.725445986 CET50116445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.726056099 CET4455011485.26.53.136192.168.2.4
                              Jan 14, 2025 21:04:17.726129055 CET50114445192.168.2.485.26.53.136
                              Jan 14, 2025 21:04:17.730073929 CET4455011585.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:17.730117083 CET50115445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.730231047 CET4455011685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:17.730283022 CET50116445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.730310917 CET50116445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:17.735009909 CET4455011685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:18.168026924 CET50122445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:18.174221992 CET4455012239.74.29.1192.168.2.4
                              Jan 14, 2025 21:04:18.174338102 CET50122445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:18.179302931 CET50122445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:18.184094906 CET4455012239.74.29.1192.168.2.4
                              Jan 14, 2025 21:04:18.793411970 CET50128445192.168.2.495.154.143.226
                              Jan 14, 2025 21:04:18.798338890 CET4455012895.154.143.226192.168.2.4
                              Jan 14, 2025 21:04:18.798455954 CET50128445192.168.2.495.154.143.226
                              Jan 14, 2025 21:04:18.798584938 CET50128445192.168.2.495.154.143.226
                              Jan 14, 2025 21:04:18.798830032 CET50129445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.803658009 CET4455012895.154.143.226192.168.2.4
                              Jan 14, 2025 21:04:18.803670883 CET4455012995.154.143.1192.168.2.4
                              Jan 14, 2025 21:04:18.803746939 CET50128445192.168.2.495.154.143.226
                              Jan 14, 2025 21:04:18.803813934 CET50129445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.803885937 CET50129445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.804301977 CET50130445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.808768034 CET4455012995.154.143.1192.168.2.4
                              Jan 14, 2025 21:04:18.808837891 CET50129445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.809149981 CET4455013095.154.143.1192.168.2.4
                              Jan 14, 2025 21:04:18.809223890 CET50130445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.809273958 CET50130445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:18.814074993 CET4455013095.154.143.1192.168.2.4
                              Jan 14, 2025 21:04:19.132407904 CET4455004719.135.66.1192.168.2.4
                              Jan 14, 2025 21:04:19.132623911 CET50047445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:19.132642031 CET50047445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:19.132721901 CET50047445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:19.137547016 CET4455004719.135.66.1192.168.2.4
                              Jan 14, 2025 21:04:19.137577057 CET4455004719.135.66.1192.168.2.4
                              Jan 14, 2025 21:04:19.222738028 CET4455004817.207.165.1192.168.2.4
                              Jan 14, 2025 21:04:19.222852945 CET50048445192.168.2.417.207.165.1
                              Jan 14, 2025 21:04:19.222913980 CET50048445192.168.2.417.207.165.1
                              Jan 14, 2025 21:04:19.222975016 CET50048445192.168.2.417.207.165.1
                              Jan 14, 2025 21:04:19.227674961 CET4455004817.207.165.1192.168.2.4
                              Jan 14, 2025 21:04:19.227763891 CET4455004817.207.165.1192.168.2.4
                              Jan 14, 2025 21:04:19.277555943 CET50131445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.282392025 CET4455013117.207.165.2192.168.2.4
                              Jan 14, 2025 21:04:19.282522917 CET50131445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.282582045 CET50131445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.282996893 CET50132445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.287832022 CET4455013217.207.165.2192.168.2.4
                              Jan 14, 2025 21:04:19.287919044 CET50132445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.288064003 CET50132445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.288278103 CET4455013117.207.165.2192.168.2.4
                              Jan 14, 2025 21:04:19.289570093 CET4455013117.207.165.2192.168.2.4
                              Jan 14, 2025 21:04:19.289623976 CET50131445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:19.293118000 CET4455013217.207.165.2192.168.2.4
                              Jan 14, 2025 21:04:19.361917973 CET4455011685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:19.361989021 CET50116445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:19.362061024 CET50116445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:19.362112045 CET50116445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:19.366862059 CET4455011685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:19.366910934 CET4455011685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:19.809067965 CET50138445192.168.2.4129.128.31.112
                              Jan 14, 2025 21:04:19.813935995 CET44550138129.128.31.112192.168.2.4
                              Jan 14, 2025 21:04:19.814033031 CET50138445192.168.2.4129.128.31.112
                              Jan 14, 2025 21:04:19.814100981 CET50138445192.168.2.4129.128.31.112
                              Jan 14, 2025 21:04:19.814296961 CET50139445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.818955898 CET44550138129.128.31.112192.168.2.4
                              Jan 14, 2025 21:04:19.819083929 CET50138445192.168.2.4129.128.31.112
                              Jan 14, 2025 21:04:19.819087029 CET44550139129.128.31.1192.168.2.4
                              Jan 14, 2025 21:04:19.819174051 CET50139445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.819295883 CET50139445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.819618940 CET50140445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.824244022 CET44550139129.128.31.1192.168.2.4
                              Jan 14, 2025 21:04:19.824311018 CET50139445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.824426889 CET44550140129.128.31.1192.168.2.4
                              Jan 14, 2025 21:04:19.824489117 CET50140445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.824518919 CET50140445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:19.829339981 CET44550140129.128.31.1192.168.2.4
                              Jan 14, 2025 21:04:20.105587959 CET50141445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:20.110490084 CET4455014119.249.31.1192.168.2.4
                              Jan 14, 2025 21:04:20.110591888 CET50141445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:20.110652924 CET50141445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:20.115714073 CET4455014119.249.31.1192.168.2.4
                              Jan 14, 2025 21:04:20.746632099 CET50147445192.168.2.413.103.137.252
                              Jan 14, 2025 21:04:20.751518965 CET4455014713.103.137.252192.168.2.4
                              Jan 14, 2025 21:04:20.751668930 CET50147445192.168.2.413.103.137.252
                              Jan 14, 2025 21:04:20.751766920 CET50147445192.168.2.413.103.137.252
                              Jan 14, 2025 21:04:20.752038002 CET50148445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.756795883 CET4455014713.103.137.252192.168.2.4
                              Jan 14, 2025 21:04:20.756884098 CET50147445192.168.2.413.103.137.252
                              Jan 14, 2025 21:04:20.756988049 CET4455014813.103.137.1192.168.2.4
                              Jan 14, 2025 21:04:20.757101059 CET50148445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.757162094 CET50148445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.757488012 CET50149445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.762073040 CET4455014813.103.137.1192.168.2.4
                              Jan 14, 2025 21:04:20.762151003 CET50148445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.762254953 CET4455014913.103.137.1192.168.2.4
                              Jan 14, 2025 21:04:20.762320042 CET50149445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.762358904 CET50149445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:20.767081022 CET4455014913.103.137.1192.168.2.4
                              Jan 14, 2025 21:04:21.129371881 CET44550051174.8.52.1192.168.2.4
                              Jan 14, 2025 21:04:21.129453897 CET50051445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:21.129496098 CET50051445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:21.129519939 CET50051445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:21.134435892 CET44550051174.8.52.1192.168.2.4
                              Jan 14, 2025 21:04:21.134466887 CET44550051174.8.52.1192.168.2.4
                              Jan 14, 2025 21:04:21.273180962 CET4455005251.178.254.1192.168.2.4
                              Jan 14, 2025 21:04:21.273304939 CET50052445192.168.2.451.178.254.1
                              Jan 14, 2025 21:04:21.274719954 CET50052445192.168.2.451.178.254.1
                              Jan 14, 2025 21:04:21.274897099 CET50052445192.168.2.451.178.254.1
                              Jan 14, 2025 21:04:21.279577017 CET4455005251.178.254.1192.168.2.4
                              Jan 14, 2025 21:04:21.279673100 CET4455005251.178.254.1192.168.2.4
                              Jan 14, 2025 21:04:21.340138912 CET50155445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.345093966 CET4455015551.178.254.2192.168.2.4
                              Jan 14, 2025 21:04:21.345172882 CET50155445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.345268965 CET50155445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.345633984 CET50156445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.350263119 CET4455015551.178.254.2192.168.2.4
                              Jan 14, 2025 21:04:21.350310087 CET50155445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.350478888 CET4455015651.178.254.2192.168.2.4
                              Jan 14, 2025 21:04:21.350543976 CET50156445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.350564003 CET50156445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:21.355478048 CET4455015651.178.254.2192.168.2.4
                              Jan 14, 2025 21:04:21.621623039 CET50157445192.168.2.4214.131.32.23
                              Jan 14, 2025 21:04:21.626485109 CET44550157214.131.32.23192.168.2.4
                              Jan 14, 2025 21:04:21.626621962 CET50157445192.168.2.4214.131.32.23
                              Jan 14, 2025 21:04:21.626796007 CET50157445192.168.2.4214.131.32.23
                              Jan 14, 2025 21:04:21.627005100 CET50158445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.631598949 CET44550157214.131.32.23192.168.2.4
                              Jan 14, 2025 21:04:21.631680965 CET50157445192.168.2.4214.131.32.23
                              Jan 14, 2025 21:04:21.631756067 CET44550158214.131.32.1192.168.2.4
                              Jan 14, 2025 21:04:21.631824017 CET50158445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.631892920 CET50158445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.632236958 CET50159445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.637017012 CET44550159214.131.32.1192.168.2.4
                              Jan 14, 2025 21:04:21.637095928 CET50159445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.637111902 CET50159445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.637437105 CET44550158214.131.32.1192.168.2.4
                              Jan 14, 2025 21:04:21.637484074 CET50158445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:21.641891003 CET44550159214.131.32.1192.168.2.4
                              Jan 14, 2025 21:04:22.136919022 CET50165445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:22.143074036 CET4455016519.135.66.1192.168.2.4
                              Jan 14, 2025 21:04:22.143172026 CET50165445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:22.143233061 CET50165445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:22.148466110 CET4455016519.135.66.1192.168.2.4
                              Jan 14, 2025 21:04:22.371140957 CET50166445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:22.376250982 CET4455016685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:22.376348972 CET50166445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:22.376379967 CET50166445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:22.381211996 CET4455016685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:22.449551105 CET50167445192.168.2.4165.82.220.242
                              Jan 14, 2025 21:04:22.455291986 CET44550167165.82.220.242192.168.2.4
                              Jan 14, 2025 21:04:22.455383062 CET50167445192.168.2.4165.82.220.242
                              Jan 14, 2025 21:04:22.455406904 CET50167445192.168.2.4165.82.220.242
                              Jan 14, 2025 21:04:22.455495119 CET50168445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.461105108 CET44550168165.82.220.1192.168.2.4
                              Jan 14, 2025 21:04:22.461179972 CET50168445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.461210012 CET50168445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.461584091 CET50169445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.462707043 CET44550167165.82.220.242192.168.2.4
                              Jan 14, 2025 21:04:22.462765932 CET50167445192.168.2.4165.82.220.242
                              Jan 14, 2025 21:04:22.466169119 CET44550168165.82.220.1192.168.2.4
                              Jan 14, 2025 21:04:22.466331959 CET50168445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.466392994 CET44550169165.82.220.1192.168.2.4
                              Jan 14, 2025 21:04:22.466459990 CET50169445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.466515064 CET50169445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:22.471251965 CET44550169165.82.220.1192.168.2.4
                              Jan 14, 2025 21:04:23.146269083 CET44550055206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:23.146351099 CET50055445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:23.146389008 CET50055445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:23.146440983 CET50055445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:23.151199102 CET44550055206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:23.151211023 CET44550055206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:23.215245962 CET50175445192.168.2.438.251.3.58
                              Jan 14, 2025 21:04:23.220096111 CET4455017538.251.3.58192.168.2.4
                              Jan 14, 2025 21:04:23.220208883 CET50175445192.168.2.438.251.3.58
                              Jan 14, 2025 21:04:23.220276117 CET50175445192.168.2.438.251.3.58
                              Jan 14, 2025 21:04:23.220411062 CET50176445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:23.225234985 CET4455017638.251.3.1192.168.2.4
                              Jan 14, 2025 21:04:23.225366116 CET50176445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:23.225743055 CET50176445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:23.225816965 CET50177445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:23.228252888 CET4455017538.251.3.58192.168.2.4
                              Jan 14, 2025 21:04:23.230674982 CET4455017738.251.3.1192.168.2.4
                              Jan 14, 2025 21:04:23.231062889 CET50177445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:23.231062889 CET50177445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:23.232342958 CET4455017638.251.3.1192.168.2.4
                              Jan 14, 2025 21:04:23.236550093 CET4455017738.251.3.1192.168.2.4
                              Jan 14, 2025 21:04:23.244152069 CET4455017538.251.3.58192.168.2.4
                              Jan 14, 2025 21:04:23.244219065 CET50175445192.168.2.438.251.3.58
                              Jan 14, 2025 21:04:23.245194912 CET4455017638.251.3.1192.168.2.4
                              Jan 14, 2025 21:04:23.245274067 CET50176445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:24.012844086 CET4455016685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:24.012996912 CET50166445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:24.013046980 CET50166445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:24.013098001 CET50166445192.168.2.485.26.53.1
                              Jan 14, 2025 21:04:24.018440008 CET4455016685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:24.018475056 CET4455016685.26.53.1192.168.2.4
                              Jan 14, 2025 21:04:24.074542046 CET50184445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.079606056 CET4455018485.26.53.2192.168.2.4
                              Jan 14, 2025 21:04:24.079687119 CET50184445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.079730988 CET50184445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.080188990 CET50185445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.085155964 CET4455018485.26.53.2192.168.2.4
                              Jan 14, 2025 21:04:24.085186958 CET4455018585.26.53.2192.168.2.4
                              Jan 14, 2025 21:04:24.085225105 CET50184445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.085266113 CET50185445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.085314989 CET50185445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:24.090364933 CET4455018585.26.53.2192.168.2.4
                              Jan 14, 2025 21:04:24.136997938 CET50186445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:24.142044067 CET44550186174.8.52.1192.168.2.4
                              Jan 14, 2025 21:04:24.142127991 CET50186445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:24.142200947 CET50186445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:24.147366047 CET44550186174.8.52.1192.168.2.4
                              Jan 14, 2025 21:04:25.161864042 CET4455005830.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:25.162039042 CET50058445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:25.162113905 CET50058445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:25.162113905 CET50058445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:25.166860104 CET4455005830.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:25.166874886 CET4455005830.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:25.644534111 CET445500597.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:25.644629955 CET50059445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:25.644694090 CET50059445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:25.644761086 CET50059445192.168.2.47.204.138.1
                              Jan 14, 2025 21:04:25.650188923 CET445500597.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:25.650217056 CET445500597.204.138.1192.168.2.4
                              Jan 14, 2025 21:04:25.699678898 CET50200445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.704493999 CET445502007.204.138.2192.168.2.4
                              Jan 14, 2025 21:04:25.704600096 CET50200445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.704641104 CET50200445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.705079079 CET50201445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.710661888 CET445502007.204.138.2192.168.2.4
                              Jan 14, 2025 21:04:25.710679054 CET445502017.204.138.2192.168.2.4
                              Jan 14, 2025 21:04:25.710724115 CET50200445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.710778952 CET50201445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.710927010 CET50201445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:25.715857983 CET445502017.204.138.2192.168.2.4
                              Jan 14, 2025 21:04:26.152478933 CET50209445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:26.157305002 CET44550209206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:26.157414913 CET50209445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:26.157562971 CET50209445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:26.162301064 CET44550209206.149.19.1192.168.2.4
                              Jan 14, 2025 21:04:27.159427881 CET4455006276.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:27.159559965 CET50062445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:27.159600973 CET50062445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:27.159635067 CET50062445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:27.164457083 CET4455006276.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:27.164470911 CET4455006276.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:27.302515030 CET4455006327.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:27.302649975 CET50063445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:27.302716017 CET50063445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:27.302779913 CET50063445192.168.2.427.44.253.1
                              Jan 14, 2025 21:04:27.307450056 CET4455006327.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:27.307504892 CET4455006327.44.253.1192.168.2.4
                              Jan 14, 2025 21:04:27.355889082 CET50224445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.360738039 CET4455022427.44.253.2192.168.2.4
                              Jan 14, 2025 21:04:27.360817909 CET50224445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.360860109 CET50224445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.361321926 CET50226445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.365771055 CET4455022427.44.253.2192.168.2.4
                              Jan 14, 2025 21:04:27.365827084 CET50224445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.366094112 CET4455022627.44.253.2192.168.2.4
                              Jan 14, 2025 21:04:27.366153002 CET50226445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.366215944 CET50226445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:27.370940924 CET4455022627.44.253.2192.168.2.4
                              Jan 14, 2025 21:04:28.176917076 CET50237445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:28.181770086 CET4455023730.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:28.184892893 CET50237445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:28.220992088 CET50237445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:28.225759029 CET4455023730.53.7.1192.168.2.4
                              Jan 14, 2025 21:04:29.052692890 CET445500663.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:29.053857088 CET50066445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:29.053905010 CET50066445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:29.053978920 CET50066445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:29.058775902 CET445500663.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:29.058789015 CET445500663.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:29.321914911 CET4455006719.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:29.322010994 CET50067445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:29.322068930 CET50067445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:29.322103977 CET50067445192.168.2.419.72.220.1
                              Jan 14, 2025 21:04:29.326869011 CET4455006719.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:29.326894999 CET4455006719.72.220.1192.168.2.4
                              Jan 14, 2025 21:04:29.386832952 CET50258445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.391813040 CET4455025819.72.220.2192.168.2.4
                              Jan 14, 2025 21:04:29.391896963 CET50258445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.391942024 CET50258445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.392362118 CET50259445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.396871090 CET4455025819.72.220.2192.168.2.4
                              Jan 14, 2025 21:04:29.396927118 CET50258445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.397154093 CET4455025919.72.220.2192.168.2.4
                              Jan 14, 2025 21:04:29.397227049 CET50259445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.397255898 CET50259445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:29.402060032 CET4455025919.72.220.2192.168.2.4
                              Jan 14, 2025 21:04:30.168157101 CET50275445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:30.173028946 CET4455027576.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:30.173172951 CET50275445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:30.173172951 CET50275445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:30.178014040 CET4455027576.215.58.1192.168.2.4
                              Jan 14, 2025 21:04:30.849570990 CET4455007048.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:30.851455927 CET50070445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:30.851551056 CET50070445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:30.851614952 CET50070445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:30.856417894 CET4455007048.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:30.856427908 CET4455007048.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:31.316461086 CET44550071172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:31.316550016 CET50071445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:31.316615105 CET50071445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:31.316615105 CET50071445192.168.2.4172.230.50.1
                              Jan 14, 2025 21:04:31.321399927 CET44550071172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:31.321427107 CET44550071172.230.50.1192.168.2.4
                              Jan 14, 2025 21:04:31.371357918 CET50303445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.376226902 CET44550303172.230.50.2192.168.2.4
                              Jan 14, 2025 21:04:31.376317024 CET50303445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.376425982 CET50303445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.376770973 CET50305445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.381459951 CET44550303172.230.50.2192.168.2.4
                              Jan 14, 2025 21:04:31.381568909 CET44550305172.230.50.2192.168.2.4
                              Jan 14, 2025 21:04:31.381663084 CET50305445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.381705046 CET50305445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.381949902 CET50303445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:31.386527061 CET44550305172.230.50.2192.168.2.4
                              Jan 14, 2025 21:04:32.058665037 CET50323445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:32.063548088 CET445503233.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:32.063746929 CET50323445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:32.063766003 CET50323445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:32.068536043 CET445503233.121.48.1192.168.2.4
                              Jan 14, 2025 21:04:32.429497957 CET44550074106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:32.429574966 CET50074445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:32.429611921 CET50074445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:32.429640055 CET50074445192.168.2.4106.197.232.1
                              Jan 14, 2025 21:04:32.434622049 CET44550074106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:32.434643984 CET44550074106.197.232.1192.168.2.4
                              Jan 14, 2025 21:04:33.349908113 CET4455007515.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:33.350150108 CET50075445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:33.364295006 CET50075445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:33.364343882 CET50075445192.168.2.415.181.139.1
                              Jan 14, 2025 21:04:33.370371103 CET4455007515.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:33.370383024 CET4455007515.181.139.1192.168.2.4
                              Jan 14, 2025 21:04:33.463903904 CET50373445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.468805075 CET4455037315.181.139.2192.168.2.4
                              Jan 14, 2025 21:04:33.468873978 CET50373445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.468895912 CET50373445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.474371910 CET4455037315.181.139.2192.168.2.4
                              Jan 14, 2025 21:04:33.474425077 CET50373445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.477610111 CET50376445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.482464075 CET4455037615.181.139.2192.168.2.4
                              Jan 14, 2025 21:04:33.482537031 CET50376445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.482573032 CET50376445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:33.487350941 CET4455037615.181.139.2192.168.2.4
                              Jan 14, 2025 21:04:33.857338905 CET50393445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:33.862854958 CET4455039348.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:33.862941027 CET50393445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:33.865673065 CET50393445192.168.2.448.100.13.1
                              Jan 14, 2025 21:04:33.870994091 CET4455039348.100.13.1192.168.2.4
                              Jan 14, 2025 21:04:34.068300962 CET44550078119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:34.068388939 CET50078445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:34.070018053 CET50078445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:34.070085049 CET50078445192.168.2.4119.29.17.1
                              Jan 14, 2025 21:04:34.074866056 CET44550078119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:34.074985027 CET44550078119.29.17.1192.168.2.4
                              Jan 14, 2025 21:04:35.365277052 CET44550080155.185.174.1192.168.2.4
                              Jan 14, 2025 21:04:35.365324974 CET50080445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:35.410126925 CET44550083176.153.185.1192.168.2.4
                              Jan 14, 2025 21:04:35.410218954 CET50083445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:36.476735115 CET44550089197.203.23.3192.168.2.4
                              Jan 14, 2025 21:04:36.478713989 CET50089445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:36.725162029 CET44550092152.209.52.1192.168.2.4
                              Jan 14, 2025 21:04:36.728883982 CET50092445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:37.039747953 CET50113445192.168.2.4148.126.233.2
                              Jan 14, 2025 21:04:37.040061951 CET50259445192.168.2.419.72.220.2
                              Jan 14, 2025 21:04:37.040090084 CET50201445192.168.2.47.204.138.2
                              Jan 14, 2025 21:04:37.040150881 CET50185445192.168.2.485.26.53.2
                              Jan 14, 2025 21:04:37.040193081 CET50226445192.168.2.427.44.253.2
                              Jan 14, 2025 21:04:37.040230036 CET50165445192.168.2.419.135.66.1
                              Jan 14, 2025 21:04:37.040290117 CET50132445192.168.2.417.207.165.2
                              Jan 14, 2025 21:04:37.040318966 CET50080445192.168.2.4155.185.174.1
                              Jan 14, 2025 21:04:37.040388107 CET50083445192.168.2.4176.153.185.1
                              Jan 14, 2025 21:04:37.040448904 CET50092445192.168.2.4152.209.52.1
                              Jan 14, 2025 21:04:37.040487051 CET50089445192.168.2.4197.203.23.3
                              Jan 14, 2025 21:04:37.040488958 CET50098445192.168.2.493.140.22.1
                              Jan 14, 2025 21:04:37.040517092 CET50106445192.168.2.4135.107.147.1
                              Jan 14, 2025 21:04:37.040550947 CET50122445192.168.2.439.74.29.1
                              Jan 14, 2025 21:04:37.040575981 CET50130445192.168.2.495.154.143.1
                              Jan 14, 2025 21:04:37.040612936 CET50140445192.168.2.4129.128.31.1
                              Jan 14, 2025 21:04:37.040648937 CET50141445192.168.2.419.249.31.1
                              Jan 14, 2025 21:04:37.040699959 CET50149445192.168.2.413.103.137.1
                              Jan 14, 2025 21:04:37.040764093 CET50159445192.168.2.4214.131.32.1
                              Jan 14, 2025 21:04:37.040783882 CET50156445192.168.2.451.178.254.2
                              Jan 14, 2025 21:04:37.040793896 CET50169445192.168.2.4165.82.220.1
                              Jan 14, 2025 21:04:37.040908098 CET50186445192.168.2.4174.8.52.1
                              Jan 14, 2025 21:04:37.040932894 CET50209445192.168.2.4206.149.19.1
                              Jan 14, 2025 21:04:37.040934086 CET50177445192.168.2.438.251.3.1
                              Jan 14, 2025 21:04:37.040985107 CET50275445192.168.2.476.215.58.1
                              Jan 14, 2025 21:04:37.041014910 CET50237445192.168.2.430.53.7.1
                              Jan 14, 2025 21:04:37.041073084 CET50305445192.168.2.4172.230.50.2
                              Jan 14, 2025 21:04:37.041120052 CET50323445192.168.2.43.121.48.1
                              Jan 14, 2025 21:04:37.041224003 CET50376445192.168.2.415.181.139.2
                              Jan 14, 2025 21:04:37.041321039 CET50393445192.168.2.448.100.13.1
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 21:03:28.144912004 CET5099153192.168.2.41.1.1.1
                              Jan 14, 2025 21:03:28.451952934 CET53509911.1.1.1192.168.2.4
                              Jan 14, 2025 21:03:29.064383030 CET5036853192.168.2.41.1.1.1
                              Jan 14, 2025 21:03:29.546581030 CET53503681.1.1.1192.168.2.4
                              Jan 14, 2025 21:03:37.352080107 CET138138192.168.2.4192.168.2.255
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 14, 2025 21:03:28.144912004 CET192.168.2.41.1.1.10x3e4eStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                              Jan 14, 2025 21:03:29.064383030 CET192.168.2.41.1.1.10x8eadStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 14, 2025 21:03:28.451952934 CET1.1.1.1192.168.2.40x3e4eNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                              Jan 14, 2025 21:03:29.546581030 CET1.1.1.1192.168.2.40x8eadNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                              Jan 14, 2025 21:03:29.546581030 CET1.1.1.1192.168.2.40x8eadNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                              • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730103.224.212.215801696C:\Windows\mssecsvr.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 21:03:28.469108105 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Cache-Control: no-cache
                              Jan 14, 2025 21:03:29.054085970 CET365INHTTP/1.1 302 Found
                              date: Tue, 14 Jan 2025 20:03:28 GMT
                              server: Apache
                              set-cookie: __tad=1736885008.2630796; expires=Fri, 12-Jan-2035 20:03:28 GMT; Max-Age=315360000
                              location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-2865-a082-552e366d7d4c
                              content-length: 2
                              content-type: text/html; charset=UTF-8
                              connection: close
                              Data Raw: 0a 0a
                              Data Ascii:


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.449731199.59.243.228801696C:\Windows\mssecsvr.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 21:03:29.568738937 CET169OUTGET /?subid1=20250115-0703-2865-a082-552e366d7d4c HTTP/1.1
                              Cache-Control: no-cache
                              Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Connection: Keep-Alive
                              Jan 14, 2025 21:03:30.026355028 CET1236INHTTP/1.1 200 OK
                              date: Tue, 14 Jan 2025 20:03:29 GMT
                              content-type: text/html; charset=utf-8
                              content-length: 1262
                              x-request-id: 229b9e3a-b57d-4a5f-bf1e-23a1a6fda947
                              cache-control: no-store, max-age=0
                              accept-ch: sec-ch-prefers-color-scheme
                              critical-ch: sec-ch-prefers-color-scheme
                              vary: sec-ch-prefers-color-scheme
                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_BFiB23KC7Oe4Fc5fqPgBynyGHtfxB9duwwH1VRuoszXxovK75IBBOKWze3Oe5GjQh5kpJPkOGFpGBe1G9hg+uQ==
                              set-cookie: parking_session=229b9e3a-b57d-4a5f-bf1e-23a1a6fda947; expires=Tue, 14 Jan 2025 20:18:29 GMT; path=/
                              Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 42 46 69 42 32 33 4b 43 37 4f 65 34 46 63 35 66 71 50 67 42 79 6e 79 47 48 74 66 78 42 39 64 75 77 77 48 31 56 52 75 6f 73 7a 58 78 6f 76 4b 37 35 49 42 42 4f 4b 57 7a 65 33 4f 65 35 47 6a 51 68 35 6b 70 4a 50 6b 4f 47 46 70 47 42 65 31 47 39 68 67 2b 75 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                              Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_BFiB23KC7Oe4Fc5fqPgBynyGHtfxB9duwwH1VRuoszXxovK75IBBOKWze3Oe5GjQh5kpJPkOGFpGBe1G9hg+uQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                              Jan 14, 2025 21:03:30.026376009 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                              Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMjI5YjllM2EtYjU3ZC00YTVmLWJmMWUtMjNhMWE2ZmRhOTQ3IiwicGFnZV90aW1lIjoxNzM2ODg1MDA5LCJwYWdlX3VybCI6I


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.449732103.224.212.215803300C:\Windows\mssecsvr.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 21:03:30.296466112 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Cache-Control: no-cache
                              Jan 14, 2025 21:03:30.914510012 CET365INHTTP/1.1 302 Found
                              date: Tue, 14 Jan 2025 20:03:30 GMT
                              server: Apache
                              set-cookie: __tad=1736885010.1930978; expires=Fri, 12-Jan-2035 20:03:30 GMT; Max-Age=315360000
                              location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-3025-82b1-2f8f29489b53
                              content-length: 2
                              content-type: text/html; charset=UTF-8
                              connection: close
                              Data Raw: 0a 0a
                              Data Ascii:


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.449733199.59.243.228803300C:\Windows\mssecsvr.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 21:03:30.936599970 CET169OUTGET /?subid1=20250115-0703-3025-82b1-2f8f29489b53 HTTP/1.1
                              Cache-Control: no-cache
                              Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Connection: Keep-Alive
                              Jan 14, 2025 21:03:31.401421070 CET1236INHTTP/1.1 200 OK
                              date: Tue, 14 Jan 2025 20:03:30 GMT
                              content-type: text/html; charset=utf-8
                              content-length: 1262
                              x-request-id: 4a15100d-04ba-4176-bae7-9cf86b74a058
                              cache-control: no-store, max-age=0
                              accept-ch: sec-ch-prefers-color-scheme
                              critical-ch: sec-ch-prefers-color-scheme
                              vary: sec-ch-prefers-color-scheme
                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_JMqLyYvoFpOuSNxwm4hjG5wXMpqvHwHLe9D3M1CCz5jJzfCS6DPr0ooX+YeEUN2oR8DLqo9WtqbRFnZ4F6wCew==
                              set-cookie: parking_session=4a15100d-04ba-4176-bae7-9cf86b74a058; expires=Tue, 14 Jan 2025 20:18:31 GMT; path=/
                              Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4a 4d 71 4c 79 59 76 6f 46 70 4f 75 53 4e 78 77 6d 34 68 6a 47 35 77 58 4d 70 71 76 48 77 48 4c 65 39 44 33 4d 31 43 43 7a 35 6a 4a 7a 66 43 53 36 44 50 72 30 6f 6f 58 2b 59 65 45 55 4e 32 6f 52 38 44 4c 71 6f 39 57 74 71 62 52 46 6e 5a 34 46 36 77 43 65 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                              Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_JMqLyYvoFpOuSNxwm4hjG5wXMpqvHwHLe9D3M1CCz5jJzfCS6DPr0ooX+YeEUN2oR8DLqo9WtqbRFnZ4F6wCew==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                              Jan 14, 2025 21:03:31.401504993 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                              Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNGExNTEwMGQtMDRiYS00MTc2LWJhZTctOWNmODZiNzRhMDU4IiwicGFnZV90aW1lIjoxNzM2ODg1MDExLCJwYWdlX3VybCI6I


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.449734103.224.212.215805936C:\Windows\mssecsvr.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 21:03:31.068949938 CET134OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Cache-Control: no-cache
                              Cookie: __tad=1736885008.2630796
                              Jan 14, 2025 21:03:31.673543930 CET269INHTTP/1.1 302 Found
                              date: Tue, 14 Jan 2025 20:03:31 GMT
                              server: Apache
                              location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0703-312e-89e7-547aa0526945
                              content-length: 2
                              content-type: text/html; charset=UTF-8
                              connection: close
                              Data Raw: 0a 0a
                              Data Ascii:


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.449744199.59.243.228805936C:\Windows\mssecsvr.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 21:03:31.683603048 CET231OUTGET /?subid1=20250115-0703-312e-89e7-547aa0526945 HTTP/1.1
                              Cache-Control: no-cache
                              Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                              Connection: Keep-Alive
                              Cookie: parking_session=229b9e3a-b57d-4a5f-bf1e-23a1a6fda947
                              Jan 14, 2025 21:03:32.166584969 CET1236INHTTP/1.1 200 OK
                              date: Tue, 14 Jan 2025 20:03:32 GMT
                              content-type: text/html; charset=utf-8
                              content-length: 1262
                              x-request-id: f9064d32-7933-46b9-a99b-b843f03126e6
                              cache-control: no-store, max-age=0
                              accept-ch: sec-ch-prefers-color-scheme
                              critical-ch: sec-ch-prefers-color-scheme
                              vary: sec-ch-prefers-color-scheme
                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Z9A65/edJ3qdE2x+mWyB7MstdV+/Fv5WIgczi1gl2/xKrENfnPwUVm3gKzFEkLPPX0H34e8GNK2EbxG/c/ywBw==
                              set-cookie: parking_session=229b9e3a-b57d-4a5f-bf1e-23a1a6fda947; expires=Tue, 14 Jan 2025 20:18:32 GMT
                              Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 5a 39 41 36 35 2f 65 64 4a 33 71 64 45 32 78 2b 6d 57 79 42 37 4d 73 74 64 56 2b 2f 46 76 35 57 49 67 63 7a 69 31 67 6c 32 2f 78 4b 72 45 4e 66 6e 50 77 55 56 6d 33 67 4b 7a 46 45 6b 4c 50 50 58 30 48 33 34 65 38 47 4e 4b 32 45 62 78 47 2f 63 2f 79 77 42 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                              Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Z9A65/edJ3qdE2x+mWyB7MstdV+/Fv5WIgczi1gl2/xKrENfnPwUVm3gKzFEkLPPX0H34e8GNK2EbxG/c/ywBw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                              Jan 14, 2025 21:03:32.166608095 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                              Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMjI5YjllM2EtYjU3ZC00YTVmLWJmMWUtMjNhMWE2ZmRhOTQ3IiwicGFnZV90aW1lIjoxNzM2ODg1MDEyLCJwYWdlX3VybCI6Imh0dHA6L


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:15:03:26
                              Start date:14/01/2025
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll"
                              Imagebase:0x640000
                              File size:126'464 bytes
                              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:1
                              Start time:15:03:26
                              Start date:14/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:15:03:26
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:15:03:26
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\mlfk8sYaiy.dll,PlayGame
                              Imagebase:0x90000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:15:03:26
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",#1
                              Imagebase:0x90000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:15:03:26
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvr.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvr.exe
                              Imagebase:0x400000
                              File size:2'281'472 bytes
                              MD5 hash:E12B5051C561A8E11FFF28902B1A9A70
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1792421376.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1792541209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1792541209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 93%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:15:03:28
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvr.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvr.exe -m security
                              Imagebase:0x400000
                              File size:2'281'472 bytes
                              MD5 hash:E12B5051C561A8E11FFF28902B1A9A70
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2466371116.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1813727763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1813727763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1813606958.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2466716906.0000000002274000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2466716906.0000000002274000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:15:03:29
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\mlfk8sYaiy.dll",PlayGame
                              Imagebase:0x90000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:15:03:29
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvr.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvr.exe
                              Imagebase:0x400000
                              File size:2'281'472 bytes
                              MD5 hash:E12B5051C561A8E11FFF28902B1A9A70
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1821887861.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1838019382.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1822046137.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1822046137.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1838555240.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1838555240.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:71.7%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:63.2%
                                Total number of Nodes:38
                                Total number of Limit Nodes:9
                                execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F5C0EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                • CreateProcessA.KERNELBASE ref: 00407EE8
                                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1827586506.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1827570802.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827603127.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827669855.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4281112323-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1827586506.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1827570802.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827603127.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827669855.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000005.00000002.1827586506.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1827570802.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827603127.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827669855.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                • API String ID: 774561529-2614457033
                                • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F5C0EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1827586506.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1827570802.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827603127.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827669855.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                • API String ID: 3340711343-2450984573
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F5C0EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1827586506.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1827570802.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827603127.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827624899.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827669855.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1827758750.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.1
                                • API String ID: 4274534310-2839763450
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Execution Graph

                                Execution Coverage:34.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:36
                                Total number of Limit Nodes:2

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F5C0EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2465065380.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2465045529.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465094479.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465267655.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465291256.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.1
                                • API String ID: 4274534310-2839763450
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000006.00000002.2465065380.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2465045529.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465094479.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465267655.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465291256.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                • API String ID: 774561529-2614457033
                                • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F5C0EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2465065380.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2465045529.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465094479.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465267655.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465291256.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                • API String ID: 3340711343-2450984573
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F5C0EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2465065380.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2465045529.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465094479.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465267655.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465291256.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4072214828-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.2465065380.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2465045529.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465094479.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465128397.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465247372.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465267655.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465291256.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2465382842.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59