Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
m9oUIFauYl.dll

Overview

General Information

Sample name:m9oUIFauYl.dll
renamed because original name is a hash value
Original sample name:5a6865c2a2cf22984c1aaf62d6f4c736.dll
Analysis ID:1591282
MD5:5a6865c2a2cf22984c1aaf62d6f4c736
SHA1:3f4aaa1d271fa4cc65c0c14c626b5b3d7d1dcee3
SHA256:84efa21f72b2dea0b1f46c1a13dc3d231b1e0358290994c3eeac480012e4b96a
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3260 cmdline: loaddll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2544 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6288 cmdline: rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 6772 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 1AA4152354EE92FDB2C8E1F11381A8E5)
    • rundll32.exe (PID: 2016 cmdline: rundll32.exe C:\Users\user\Desktop\m9oUIFauYl.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5580 cmdline: rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 6060 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 1AA4152354EE92FDB2C8E1F11381A8E5)
  • mssecsvr.exe (PID: 2052 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: 1AA4152354EE92FDB2C8E1F11381A8E5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
m9oUIFauYl.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    m9oUIFauYl.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    m9oUIFauYl.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000000.2194580978.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            00000006.00000000.2166045761.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvr.exe.1d50084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xe8d8:$x3: tasksche.exe
              • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xe92c:$x5: WNcry@2ol7
              • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xe82c:$s3: cmd.exe /c "%s"
              8.0.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              10.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xe8d8:$x3: tasksche.exe
              • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xe92c:$x5: WNcry@2ol7
              • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xe82c:$s3: cmd.exe /c "%s"
              10.0.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 87 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:10:14.541379+010028033043Unknown Traffic192.168.2.649710103.224.212.21580TCP
              2025-01-14T21:10:16.045095+010028033043Unknown Traffic192.168.2.649713103.224.212.21580TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:10:13.623857+010028300181A Network Trojan was detected192.168.2.6512541.1.1.153UDP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: m9oUIFauYl.dllAvira: detected
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043c7Avira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8f0Avira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4Avira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwAvira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8Avira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043Avira URL Cloud: Label: malware
              Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebdAvira URL Cloud: Label: malware
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 96%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 96%
              Source: m9oUIFauYl.dllVirustotal: Detection: 91%Perma Link
              Source: m9oUIFauYl.dllReversingLabs: Detection: 92%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: m9oUIFauYl.dllJoe Sandbox ML: detected

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: m9oUIFauYl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49894 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49784 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50009 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50259 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50470 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50631 version: TLS 1.2

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.6:51254 -> 1.1.1.1:53
              Source: unknownNetwork traffic detected: IP country count 13
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0710-142d-9b39-6bada5abe8f0 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736885414.2680868
              Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0710-16e0-bd1a-f1b048c043c7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=1540a814-dc09-4b25-9fe0-996b538985e8
              Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49710 -> 103.224.212.215:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49713 -> 103.224.212.215:80
              Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49894 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.209
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.209
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.209
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.209
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 201.76.167.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.219
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.219
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.219
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.219
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 58.86.16.1
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.245
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.245
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.245
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.245
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: unknownTCP traffic detected without corresponding DNS query: 180.95.118.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0710-142d-9b39-6bada5abe8f0 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736885414.2680868
              Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0710-16e0-bd1a-f1b048c043c7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=1540a814-dc09-4b25-9fe0-996b538985e8
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
              Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000BDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2210343817.00000000009CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8
              Source: mssecsvr.exe, 00000008.00000002.2837626963.0000000000A9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebd
              Source: mssecsvr.exe, 0000000A.00000002.2210343817.00000000009CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043
              Source: m9oUIFauYl.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000B7E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2202680936.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2210343817.0000000000998000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2210343817.00000000009CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
              Source: mssecsvr.exe, 0000000A.00000002.2210343817.0000000000998000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/%
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000B7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/L
              Source: mssecsvr.exe, 00000008.00000002.2837626963.0000000000AB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/e
              Source: mssecsvr.exe, 00000008.00000002.2837626963.0000000000AB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/v
              Source: mssecsvr.exe, 0000000A.00000002.2210343817.00000000009ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/z
              Source: mssecsvr.exe, 00000008.00000002.2836859666.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50259
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
              Source: unknownNetwork traffic detected: HTTP traffic on port 50470 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
              Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 50631 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50631
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50470
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 50259 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49784 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50009 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50259 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50470 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50631 version: TLS 1.2

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: m9oUIFauYl.dll, type: SAMPLE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.22aa96c.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.1d82128.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.22788c8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.1d50084.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5f104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.22838e8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5b0a4.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvr.exe.2287948.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2194580978.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.2166045761.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.2188213919.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2194747129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2209893875.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2210111513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.2188355159.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2838123149.0000000001D5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.2166194262.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2838357581.0000000002287000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6772, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 2052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6060, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: m9oUIFauYl.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: m9oUIFauYl.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d50084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d82128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.1d82128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.22aa96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.22aa96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.22aa96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.22aa96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.22788c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d82128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.1d82128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.22788c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.22788c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d50084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.1d50084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d5f104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.1d5f104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.22838e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.22838e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.1d5b0a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.1d5b0a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvr.exe.2287948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvr.exe.2287948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.2194747129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.2210111513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.2188355159.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2838123149.0000000001D5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.2166194262.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2838357581.0000000002287000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
              Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: tasksche.exe.6.drStatic PE information: No import functions for PE file found
              Source: m9oUIFauYl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: m9oUIFauYl.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: m9oUIFauYl.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d50084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d82128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.1d82128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.22aa96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.22aa96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.22aa96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.22aa96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.22788c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvr.exe.1d5f104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d82128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.1d82128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.22788c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.22788c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvr.exe.2287948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d50084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.1d50084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d5f104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.1d5f104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.22838e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.22838e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.1d5b0a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.1d5b0a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvr.exe.2287948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvr.exe.2287948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.2194747129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.2210111513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.2188355159.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2838123149.0000000001D5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.2166194262.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2838357581.0000000002287000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: tasksche.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: tasksche.exe.6.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
              Source: tasksche.exe.6.drStatic PE information: Section: .data ZLIB complexity 1.001953125
              Source: tasksche.exe.6.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
              Source: m9oUIFauYl.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
              Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
              Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvr.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3432:120:WilError_03
              Source: m9oUIFauYl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\m9oUIFauYl.dll,PlayGame
              Source: m9oUIFauYl.dllVirustotal: Detection: 91%
              Source: m9oUIFauYl.dllReversingLabs: Detection: 92%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\m9oUIFauYl.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
              Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\m9oUIFauYl.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: m9oUIFauYl.dllStatic file information: File size 5267459 > 1048576
              Source: m9oUIFauYl.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: tasksche.exe.6.drStatic PE information: section name: .text entropy: 7.6049042203582955

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
              Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvr.exe TID: 5724Thread sleep count: 96 > 30Jump to behavior
              Source: C:\Windows\mssecsvr.exe TID: 5724Thread sleep time: -192000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvr.exe TID: 5660Thread sleep count: 129 > 30Jump to behavior
              Source: C:\Windows\mssecsvr.exe TID: 5660Thread sleep count: 47 > 30Jump to behavior
              Source: C:\Windows\mssecsvr.exe TID: 5724Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvr.exe, 00000008.00000002.2837626963.0000000000AD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW4*
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000BEA000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2837626963.0000000000AD5000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2210343817.0000000000998000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2210343817.00000000009FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvr.exe, 00000008.00000002.2837626963.0000000000A77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
              Source: mssecsvr.exe, 00000006.00000002.2202680936.0000000000BA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1Jump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote ServicesData from Local System2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory11
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Software Packing
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591282 Sample: m9oUIFauYl.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 36 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->38 40 77026.bodis.com 2->40 48 Suricata IDS alerts for network traffic 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for URL or domain 2->52 54 7 other signatures 2->54 9 loaddll32.exe 1 2->9         started        11 mssecsvr.exe 12 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        18 cmd.exe 1 9->18         started        20 conhost.exe 9->20         started        22 rundll32.exe 1 9->22         started        42 192.168.2.90 unknown unknown 11->42 44 192.168.2.91 unknown unknown 11->44 46 98 other IPs or domains 11->46 56 Connects to many different private IPs via SMB (likely to spread or exploit) 11->56 58 Connects to many different private IPs (likely to spread or exploit) 11->58 signatures6 process7 signatures8 60 Drops executables to the windows directory (C:\Windows) and starts them 15->60 24 mssecsvr.exe 13 15->24         started        27 rundll32.exe 18->27         started        process9 file10 32 C:\WINDOWS\qeriuwjhrf (copy), PE32 24->32 dropped 29 mssecsvr.exe 13 27->29         started        process11 file12 34 C:\Windows\tasksche.exe, PE32 29->34 dropped

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              m9oUIFauYl.dll92%VirustotalBrowse
              m9oUIFauYl.dll92%ReversingLabsWin32.Ransomware.WannaCry
              m9oUIFauYl.dll100%AviraTR/AD.DPulsarShellcode.ujeuv
              m9oUIFauYl.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)97%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe97%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043c7100%Avira URL Cloudmalware
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8f0100%Avira URL Cloudmalware
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4100%Avira URL Cloudmalware
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ0%Avira URL Cloudsafe
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw100%Avira URL Cloudmalware
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8100%Avira URL Cloudmalware
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043100%Avira URL Cloudmalware
              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebd100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              77026.bodis.com
              199.59.243.228
              truefalse
                high
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                103.224.212.215
                truefalse
                  high
                  ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043c7false
                    • Avira URL Cloud: malware
                    unknown
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                      high
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4false
                      • Avira URL Cloud: malware
                      unknown
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8f0false
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Lmssecsvr.exe, 00000006.00000002.2202680936.0000000000B7E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.2202680936.0000000000BDD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comm9oUIFauYl.dllfalse
                          high
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebdmssecsvr.exe, 00000008.00000002.2837626963.0000000000A9A000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/%mssecsvr.exe, 0000000A.00000002.2210343817.0000000000998000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/emssecsvr.exe, 00000008.00000002.2837626963.0000000000AB5000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043mssecsvr.exe, 0000000A.00000002.2210343817.00000000009CE000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/zmssecsvr.exe, 0000000A.00000002.2210343817.00000000009ED000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000008.00000002.2836859666.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8mssecsvr.exe, 00000006.00000002.2202680936.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/vmssecsvr.exe, 00000008.00000002.2837626963.0000000000AB5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwmssecsvr.exe, 00000006.00000002.2202680936.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2210343817.00000000009CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  179.57.103.1
                                  unknownChile
                                  14117TelefonicadelSurSACLfalse
                                  179.57.103.2
                                  unknownChile
                                  14117TelefonicadelSurSACLfalse
                                  209.29.139.2
                                  unknownCanada
                                  852ASN852CAfalse
                                  209.29.139.1
                                  unknownCanada
                                  852ASN852CAfalse
                                  78.71.117.88
                                  unknownSweden
                                  3301TELIANET-SWEDENTeliaCompanySEfalse
                                  34.177.88.54
                                  unknownUnited States
                                  2686ATGS-MMD-ASUSfalse
                                  101.240.13.197
                                  unknownChina
                                  17429BGCTVNETBEIJINGGEHUACATVNETWORKCOLTDCNfalse
                                  179.57.103.3
                                  unknownChile
                                  14117TelefonicadelSurSACLfalse
                                  24.92.19.8
                                  unknownUnited States
                                  33363BHN-33363USfalse
                                  124.104.82.171
                                  unknownPhilippines
                                  9299IPG-AS-APPhilippineLongDistanceTelephoneCompanyPHfalse
                                  24.92.19.2
                                  unknownUnited States
                                  33363BHN-33363USfalse
                                  24.92.19.1
                                  unknownUnited States
                                  33363BHN-33363USfalse
                                  191.205.25.2
                                  unknownBrazil
                                  27699TELEFONICABRASILSABRfalse
                                  191.205.25.1
                                  unknownBrazil
                                  27699TELEFONICABRASILSABRfalse
                                  101.240.13.1
                                  unknownChina
                                  17429BGCTVNETBEIJINGGEHUACATVNETWORKCOLTDCNfalse
                                  205.115.6.1
                                  unknownUnited States
                                  5972DNIC-ASBLK-05800-06055USfalse
                                  86.146.125.1
                                  unknownUnited Kingdom
                                  2856BT-UK-ASBTnetUKRegionalnetworkGBfalse
                                  86.146.125.2
                                  unknownUnited Kingdom
                                  2856BT-UK-ASBTnetUKRegionalnetworkGBfalse
                                  217.202.110.1
                                  unknownItaly
                                  16232ASN-TIMServiceProviderITfalse
                                  78.71.117.1
                                  unknownSweden
                                  3301TELIANET-SWEDENTeliaCompanySEfalse
                                  223.113.3.1
                                  unknownChina
                                  56046CMNET-JIANGSU-APChinaMobilecommunicationscorporationCNfalse
                                  99.232.175.113
                                  unknownCanada
                                  812ROGERS-COMMUNICATIONSCAfalse
                                  174.157.161.1
                                  unknownUnited States
                                  10507SPCSUSfalse
                                  112.117.58.143
                                  unknownChina
                                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                  201.76.167.209
                                  unknownBrazil
                                  17222MundivoxLTDABRfalse
                                  3.107.178.2
                                  unknownUnited States
                                  16509AMAZON-02USfalse
                                  3.107.178.1
                                  unknownUnited States
                                  16509AMAZON-02USfalse
                                  8.157.50.194
                                  unknownSingapore
                                  37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                  124.104.82.1
                                  unknownPhilippines
                                  9299IPG-AS-APPhilippineLongDistanceTelephoneCompanyPHfalse
                                  58.86.16.219
                                  unknownTaiwan; Republic of China (ROC)
                                  18042KBTKoosBroadbandTelecomTWfalse
                                  3.107.178.103
                                  unknownUnited States
                                  16509AMAZON-02USfalse
                                  34.177.88.1
                                  unknownUnited States
                                  2686ATGS-MMD-ASUSfalse
                                  43.112.215.82
                                  unknownJapan4249LILLY-ASUSfalse
                                  58.86.16.1
                                  unknownTaiwan; Republic of China (ROC)
                                  18042KBTKoosBroadbandTelecomTWfalse
                                  58.86.16.2
                                  unknownTaiwan; Republic of China (ROC)
                                  18042KBTKoosBroadbandTelecomTWfalse
                                  IP
                                  192.168.2.148
                                  192.168.2.149
                                  192.168.2.146
                                  192.168.2.147
                                  192.168.2.140
                                  192.168.2.141
                                  192.168.2.144
                                  192.168.2.145
                                  192.168.2.142
                                  192.168.2.143
                                  192.168.2.159
                                  192.168.2.157
                                  192.168.2.158
                                  192.168.2.151
                                  192.168.2.152
                                  192.168.2.150
                                  192.168.2.155
                                  192.168.2.156
                                  192.168.2.153
                                  192.168.2.154
                                  192.168.2.126
                                  192.168.2.247
                                  192.168.2.127
                                  192.168.2.248
                                  192.168.2.124
                                  192.168.2.245
                                  192.168.2.125
                                  192.168.2.246
                                  192.168.2.128
                                  192.168.2.249
                                  192.168.2.129
                                  192.168.2.240
                                  192.168.2.122
                                  192.168.2.243
                                  192.168.2.123
                                  192.168.2.244
                                  192.168.2.120
                                  192.168.2.241
                                  192.168.2.121
                                  192.168.2.242
                                  192.168.2.97
                                  192.168.2.137
                                  192.168.2.96
                                  192.168.2.138
                                  192.168.2.99
                                  192.168.2.135
                                  192.168.2.98
                                  192.168.2.136
                                  192.168.2.139
                                  192.168.2.250
                                  192.168.2.130
                                  192.168.2.251
                                  192.168.2.91
                                  192.168.2.90
                                  192.168.2.93
                                  192.168.2.133
                                  192.168.2.254
                                  192.168.2.92
                                  192.168.2.134
                                  192.168.2.95
                                  192.168.2.131
                                  192.168.2.252
                                  192.168.2.94
                                  192.168.2.132
                                  192.168.2.253
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1591282
                                  Start date and time:2025-01-14 21:09:17 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 25s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:13
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:m9oUIFauYl.dll
                                  renamed because original name is a hash value
                                  Original Sample Name:5a6865c2a2cf22984c1aaf62d6f4c736.dll
                                  Detection:MAL
                                  Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .dll
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 2.23.77.188, 199.232.214.172, 84.201.210.23, 13.107.253.45, 52.149.20.212
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  15:10:15API Interceptor1x Sleep call for process: loaddll32.exe modified
                                  15:10:50API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  77026.bodis.comsUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comsUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  LisectAVT_2403002A_327.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  yrBA01LVo2.exeGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  lJt3mQqCQl.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.220
                                  xIwkOnjSIa.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.220
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ASN852CAi686.elfGet hashmaliciousUnknownBrowse
                                  • 209.171.55.67
                                  spc.elfGet hashmaliciousUnknownBrowse
                                  • 104.205.84.120
                                  arm5.elfGet hashmaliciousUnknownBrowse
                                  • 50.93.119.96
                                  x86_64.elfGet hashmaliciousUnknownBrowse
                                  • 199.126.116.113
                                  i486.elfGet hashmaliciousUnknownBrowse
                                  • 154.5.159.104
                                  mips.elfGet hashmaliciousUnknownBrowse
                                  • 199.175.181.117
                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 205.206.219.230
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 208.38.43.109
                                  res.mips.elfGet hashmaliciousUnknownBrowse
                                  • 207.216.32.185
                                  8L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                                  • 108.181.189.7
                                  TelefonicadelSurSACL5.elfGet hashmaliciousUnknownBrowse
                                  • 200.126.91.165
                                  loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 201.186.115.106
                                  splx86.elfGet hashmaliciousUnknownBrowse
                                  • 201.187.97.199
                                  arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 179.56.129.164
                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 190.211.10.83
                                  elitebotnet.arm.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 200.126.73.133
                                  b3astmode.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 181.226.100.35
                                  jew.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 201.187.25.141
                                  rebirth.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 201.187.25.140
                                  xobftuootu.elfGet hashmaliciousUnknownBrowse
                                  • 190.211.5.139
                                  TelefonicadelSurSACL5.elfGet hashmaliciousUnknownBrowse
                                  • 200.126.91.165
                                  loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 201.186.115.106
                                  splx86.elfGet hashmaliciousUnknownBrowse
                                  • 201.187.97.199
                                  arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 179.56.129.164
                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 190.211.10.83
                                  elitebotnet.arm.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 200.126.73.133
                                  b3astmode.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 181.226.100.35
                                  jew.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 201.187.25.141
                                  rebirth.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 201.187.25.140
                                  xobftuootu.elfGet hashmaliciousUnknownBrowse
                                  • 190.211.5.139
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  1138de370e523e824bbca92d049a3777sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                  • 173.222.162.64
                                  MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                  • 173.222.162.64
                                  mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                  • 173.222.162.64
                                  http://titanys.mindsetmatters.buzzGet hashmaliciousScreenConnect ToolBrowse
                                  • 173.222.162.64
                                  Document_31055.pdfGet hashmaliciousUnknownBrowse
                                  • 173.222.162.64
                                  Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                  • 173.222.162.64
                                  https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                  • 173.222.162.64
                                  Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                  • 173.222.162.64
                                  https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                  • 173.222.162.64
                                  https://github.com/MscrmTools/XrmToolBox/releases/download/v1.2024.9.69/XrmToolbox.zipGet hashmaliciousUnknownBrowse
                                  • 173.222.162.64
                                  3b5074b1b5d032e5620f69f9f700ff0eMK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                  • 40.113.103.199
                                  mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                  • 40.113.103.199
                                  http://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                  • 40.113.103.199
                                  lumma_phothockey.exeGet hashmaliciousLummaCBrowse
                                  • 40.113.103.199
                                  QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 40.113.103.199
                                  EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  No context
                                  Process:C:\Windows\mssecsvr.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2061938
                                  Entropy (8bit):7.134926589064752
                                  Encrypted:false
                                  SSDEEP:49152:SQ2MSPbcBVQej/1INRx+TSqTdX1HkQo6S:t2PoBhz1aRxcSUDk36S
                                  MD5:AB88F9571878C22C2802B14C1898D9D8
                                  SHA1:7D169BCEB28607ADD5918EA5781E91EB6ACB4392
                                  SHA-256:7A2FEF5CBD59E0113F26AC3BB17B51FC66F5EF678031907D9506DC4478B48803
                                  SHA-512:456A87CCF7A079698FC6CD63C2C2B3F93407CD212E75C4C91A6965ACC0BDB37149D2E3E2F2A7A7CA0963E944754535FBBE823C5B5002ED123B21CEAE5A5A6BA2
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 97%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\mssecsvr.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2061938
                                  Entropy (8bit):7.134926589064752
                                  Encrypted:false
                                  SSDEEP:49152:SQ2MSPbcBVQej/1INRx+TSqTdX1HkQo6S:t2PoBhz1aRxcSUDk36S
                                  MD5:AB88F9571878C22C2802B14C1898D9D8
                                  SHA1:7D169BCEB28607ADD5918EA5781E91EB6ACB4392
                                  SHA-256:7A2FEF5CBD59E0113F26AC3BB17B51FC66F5EF678031907D9506DC4478B48803
                                  SHA-512:456A87CCF7A079698FC6CD63C2C2B3F93407CD212E75C4C91A6965ACC0BDB37149D2E3E2F2A7A7CA0963E944754535FBBE823C5B5002ED123B21CEAE5A5A6BA2
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 97%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):3.6688950007827157
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                  • DOS Executable Generic (2002/1) 0.20%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:m9oUIFauYl.dll
                                  File size:5'267'459 bytes
                                  MD5:5a6865c2a2cf22984c1aaf62d6f4c736
                                  SHA1:3f4aaa1d271fa4cc65c0c14c626b5b3d7d1dcee3
                                  SHA256:84efa21f72b2dea0b1f46c1a13dc3d231b1e0358290994c3eeac480012e4b96a
                                  SHA512:c13ab19d49c2390bbe1b17e39f73552ba6bd446f21cd5474e56dc33581ef9ae368731302224184dcd8567e3d70610124d02b7711302cdca6fe37704caf72f7be
                                  SSDEEP:49152:RnsQ2MSPbcBVQej/1INRx+TSqTdX1HkQo6S:1/2PoBhz1aRxcSUDk36S
                                  TLSH:723623E971BCA1FCD10579B494B78913E6F23C9E22FD6E0F9B8049660D03B59BB50A43
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                  Icon Hash:7ae282899bbab082
                                  Entrypoint:0x100011e9
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x10000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                  DLL Characteristics:
                                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push ebx
                                  mov ebx, dword ptr [ebp+08h]
                                  push esi
                                  mov esi, dword ptr [ebp+0Ch]
                                  push edi
                                  mov edi, dword ptr [ebp+10h]
                                  test esi, esi
                                  jne 00007FB930F6E9EBh
                                  cmp dword ptr [10003140h], 00000000h
                                  jmp 00007FB930F6EA08h
                                  cmp esi, 01h
                                  je 00007FB930F6E9E7h
                                  cmp esi, 02h
                                  jne 00007FB930F6EA04h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007FB930F6E9EBh
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  test eax, eax
                                  je 00007FB930F6E9EEh
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007FB930F6E8FAh
                                  test eax, eax
                                  jne 00007FB930F6E9E6h
                                  xor eax, eax
                                  jmp 00007FB930F6EA30h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007FB930F6E7ACh
                                  cmp esi, 01h
                                  mov dword ptr [ebp+0Ch], eax
                                  jne 00007FB930F6E9EEh
                                  test eax, eax
                                  jne 00007FB930F6EA19h
                                  push edi
                                  push eax
                                  push ebx
                                  call 00007FB930F6E8D6h
                                  test esi, esi
                                  je 00007FB930F6E9E7h
                                  cmp esi, 03h
                                  jne 00007FB930F6EA08h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007FB930F6E8C5h
                                  test eax, eax
                                  jne 00007FB930F6E9E5h
                                  and dword ptr [ebp+0Ch], eax
                                  cmp dword ptr [ebp+0Ch], 00000000h
                                  je 00007FB930F6E9F3h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007FB930F6E9EAh
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  mov dword ptr [ebp+0Ch], eax
                                  mov eax, dword ptr [ebp+0Ch]
                                  pop edi
                                  pop esi
                                  pop ebx
                                  pop ebp
                                  retn 000Ch
                                  jmp dword ptr [10002028h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  Programming Language:
                                  • [ C ] VS98 (6.0) build 8168
                                  • [C++] VS98 (6.0) build 8168
                                  • [RES] VS98 (6.0) cvtres build 1720
                                  • [LNK] VS98 (6.0) imp/exp build 8168
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x40000x5000600x501000cb2a1f68d63de585f0aab09379d82ffeunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  W0x40600x500000dataEnglishUnited States0.8783884048461914
                                  DLLImport
                                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                  NameOrdinalAddress
                                  PlayGame10x10001114
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-14T21:10:13.623857+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.6512541.1.1.153UDP
                                  2025-01-14T21:10:14.541379+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649710103.224.212.21580TCP
                                  2025-01-14T21:10:16.045095+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649713103.224.212.21580TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 14, 2025 21:10:11.948571920 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:11.948625088 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:11.948740959 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:11.949225903 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:11.949263096 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.780100107 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.780210018 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.786201954 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.786217928 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.786627054 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.789913893 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.789973021 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.789982080 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.790085077 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.835335016 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.966912985 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.966995955 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:12.967078924 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.967323065 CET49709443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:12.967366934 CET4434970940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:13.934376955 CET4971080192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:13.939418077 CET8049710103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:13.940608025 CET4971080192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:13.948256016 CET4971080192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:13.953310013 CET8049710103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:14.319528103 CET49673443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:14.329405069 CET49674443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:14.541198969 CET8049710103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:14.541244984 CET8049710103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:14.541378975 CET4971080192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:14.569120884 CET4971080192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:14.574214935 CET8049710103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:14.657510042 CET49672443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:14.756752968 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:14.761650085 CET8049711199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:14.763499975 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:14.764482021 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:14.769298077 CET8049711199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:15.217813015 CET8049711199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:15.217858076 CET8049711199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:15.217883110 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:15.217920065 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:15.225486994 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:15.225518942 CET4971180192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:15.436964035 CET4971380192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:15.441833019 CET8049713103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:15.441921949 CET4971380192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:15.442264080 CET4971380192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:15.447060108 CET8049713103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.045011997 CET8049713103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.045078993 CET8049713103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.045094967 CET4971380192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.045192003 CET4971380192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.069205999 CET4971380192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.070854902 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.074105978 CET8049713103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.075670958 CET8049714199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:16.075793982 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.075819969 CET4971580192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.076160908 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.080662966 CET8049715103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.080740929 CET4971580192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.081079006 CET4971580192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.081110954 CET8049714199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:16.085848093 CET8049715103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.317035913 CET44349705173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:16.317265987 CET49705443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:16.562834024 CET8049714199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:16.562855959 CET8049714199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:16.562916040 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.562956095 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.570806026 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.570806026 CET4971480192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.616127014 CET49721445192.168.2.6201.76.167.209
                                  Jan 14, 2025 21:10:16.621117115 CET44549721201.76.167.209192.168.2.6
                                  Jan 14, 2025 21:10:16.621196985 CET49721445192.168.2.6201.76.167.209
                                  Jan 14, 2025 21:10:16.621860981 CET49721445192.168.2.6201.76.167.209
                                  Jan 14, 2025 21:10:16.622124910 CET49722445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.626852989 CET44549721201.76.167.209192.168.2.6
                                  Jan 14, 2025 21:10:16.626929045 CET49721445192.168.2.6201.76.167.209
                                  Jan 14, 2025 21:10:16.627051115 CET44549722201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:16.627130032 CET49722445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.627166033 CET49722445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.631074905 CET49723445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.632308006 CET44549722201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:16.636046886 CET44549723201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:16.636082888 CET44549722201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:16.636115074 CET49723445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.636142969 CET49722445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.636182070 CET49723445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:16.641024113 CET44549723201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:16.702507019 CET8049715103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.702559948 CET8049715103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.702567101 CET4971580192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.702615023 CET4971580192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.705490112 CET4971580192.168.2.6103.224.212.215
                                  Jan 14, 2025 21:10:16.707045078 CET4972680192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.710342884 CET8049715103.224.212.215192.168.2.6
                                  Jan 14, 2025 21:10:16.711910963 CET8049726199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:16.711990118 CET4972680192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.712132931 CET4972680192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:16.716993093 CET8049726199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:17.175723076 CET8049726199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:17.175760031 CET8049726199.59.243.228192.168.2.6
                                  Jan 14, 2025 21:10:17.175834894 CET4972680192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:17.291542053 CET4972680192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:17.291579962 CET4972680192.168.2.6199.59.243.228
                                  Jan 14, 2025 21:10:18.627693892 CET49757445192.168.2.658.86.16.219
                                  Jan 14, 2025 21:10:18.632581949 CET4454975758.86.16.219192.168.2.6
                                  Jan 14, 2025 21:10:18.632663965 CET49757445192.168.2.658.86.16.219
                                  Jan 14, 2025 21:10:18.632709026 CET49757445192.168.2.658.86.16.219
                                  Jan 14, 2025 21:10:18.632906914 CET49758445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.637625933 CET4454975758.86.16.219192.168.2.6
                                  Jan 14, 2025 21:10:18.637779951 CET4454975858.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:18.637861967 CET49758445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.637911081 CET49758445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.637917995 CET49757445192.168.2.658.86.16.219
                                  Jan 14, 2025 21:10:18.640872002 CET49759445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.642767906 CET4454975858.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:18.642819881 CET49758445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.645701885 CET4454975958.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:18.645761967 CET49759445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.645808935 CET49759445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:18.650542974 CET4454975958.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:20.113890886 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.113939047 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:20.114104986 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.114918947 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.114932060 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:20.643229008 CET49794445192.168.2.6180.95.118.245
                                  Jan 14, 2025 21:10:20.648176908 CET44549794180.95.118.245192.168.2.6
                                  Jan 14, 2025 21:10:20.648287058 CET49794445192.168.2.6180.95.118.245
                                  Jan 14, 2025 21:10:20.648354053 CET49794445192.168.2.6180.95.118.245
                                  Jan 14, 2025 21:10:20.648545980 CET49795445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.653287888 CET44549794180.95.118.245192.168.2.6
                                  Jan 14, 2025 21:10:20.653322935 CET44549795180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:20.653340101 CET49794445192.168.2.6180.95.118.245
                                  Jan 14, 2025 21:10:20.653394938 CET49795445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.653460979 CET49795445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.654541969 CET49796445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.658345938 CET44549795180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:20.658416033 CET49795445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.659404039 CET44549796180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:20.659481049 CET49796445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.659532070 CET49796445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:20.664407969 CET44549796180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:20.920588970 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:20.920732021 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.923995972 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.924005985 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:20.924264908 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:20.926326036 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.926326036 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.926345110 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:20.926485062 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:20.971323967 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:21.101259947 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:21.101480961 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:21.101687908 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:21.102189064 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:21.102210999 CET4434978440.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:21.102230072 CET49784443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:22.658771038 CET49830445192.168.2.6209.29.139.209
                                  Jan 14, 2025 21:10:22.663875103 CET44549830209.29.139.209192.168.2.6
                                  Jan 14, 2025 21:10:22.664011955 CET49830445192.168.2.6209.29.139.209
                                  Jan 14, 2025 21:10:22.664134979 CET49830445192.168.2.6209.29.139.209
                                  Jan 14, 2025 21:10:22.664145947 CET49831445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:22.669337988 CET44549831209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:22.669353008 CET44549830209.29.139.209192.168.2.6
                                  Jan 14, 2025 21:10:22.669495106 CET49830445192.168.2.6209.29.139.209
                                  Jan 14, 2025 21:10:22.669555902 CET49831445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:22.670605898 CET49832445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:22.674577951 CET44549831209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:22.674679041 CET49831445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:22.675453901 CET44549832209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:22.675616980 CET49832445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:22.675616980 CET49832445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:22.680512905 CET44549832209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:23.713956118 CET44549723201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:23.714086056 CET49723445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:23.714135885 CET49723445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:23.714202881 CET49723445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:23.719068050 CET44549723201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:23.719099045 CET44549723201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:24.674207926 CET49865445192.168.2.686.146.125.62
                                  Jan 14, 2025 21:10:24.679135084 CET4454986586.146.125.62192.168.2.6
                                  Jan 14, 2025 21:10:24.679224968 CET49865445192.168.2.686.146.125.62
                                  Jan 14, 2025 21:10:24.679250002 CET49865445192.168.2.686.146.125.62
                                  Jan 14, 2025 21:10:24.679425955 CET49866445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.684389114 CET4454986686.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:24.684422970 CET4454986586.146.125.62192.168.2.6
                                  Jan 14, 2025 21:10:24.684484005 CET49866445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.684528112 CET49866445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.685244083 CET4454986586.146.125.62192.168.2.6
                                  Jan 14, 2025 21:10:24.685300112 CET49865445192.168.2.686.146.125.62
                                  Jan 14, 2025 21:10:24.685709953 CET49867445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.689457893 CET4454986686.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:24.689572096 CET49866445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.690603018 CET4454986786.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:24.690669060 CET49867445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.690718889 CET49867445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:24.695508003 CET4454986786.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:26.060374975 CET49705443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:26.060436010 CET49705443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:26.060831070 CET49894443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:26.060884953 CET44349894173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:26.061064959 CET49894443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:26.061321974 CET49894443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:26.061341047 CET44349894173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:26.065263987 CET44349705173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:26.065277100 CET44349705173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:26.680849075 CET44349894173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:26.680929899 CET49894443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:26.690186024 CET49905445192.168.2.6117.201.167.221
                                  Jan 14, 2025 21:10:26.695075035 CET44549905117.201.167.221192.168.2.6
                                  Jan 14, 2025 21:10:26.695210934 CET49905445192.168.2.6117.201.167.221
                                  Jan 14, 2025 21:10:26.695246935 CET49905445192.168.2.6117.201.167.221
                                  Jan 14, 2025 21:10:26.695493937 CET49906445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.700397968 CET44549905117.201.167.221192.168.2.6
                                  Jan 14, 2025 21:10:26.700414896 CET44549906117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:26.700486898 CET49906445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.700503111 CET44549905117.201.167.221192.168.2.6
                                  Jan 14, 2025 21:10:26.700525045 CET49906445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.700551987 CET49905445192.168.2.6117.201.167.221
                                  Jan 14, 2025 21:10:26.701497078 CET49907445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.705806017 CET44549906117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:26.705866098 CET49906445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.706387997 CET44549907117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:26.706685066 CET49907445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.706873894 CET49907445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:26.711636066 CET44549907117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:26.721271038 CET49908445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:26.726280928 CET44549908201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:26.729538918 CET49908445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:26.730767965 CET49908445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:26.735655069 CET44549908201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:28.704745054 CET49942445192.168.2.63.107.178.103
                                  Jan 14, 2025 21:10:28.709661007 CET445499423.107.178.103192.168.2.6
                                  Jan 14, 2025 21:10:28.709737062 CET49942445192.168.2.63.107.178.103
                                  Jan 14, 2025 21:10:28.709777117 CET49942445192.168.2.63.107.178.103
                                  Jan 14, 2025 21:10:28.709898949 CET49943445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.714711905 CET445499433.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:28.714773893 CET49943445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.714843988 CET445499423.107.178.103192.168.2.6
                                  Jan 14, 2025 21:10:28.714844942 CET49943445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.715055943 CET49942445192.168.2.63.107.178.103
                                  Jan 14, 2025 21:10:28.715136051 CET49944445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.719780922 CET445499433.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:28.719831944 CET49943445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.719933033 CET445499443.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:28.720012903 CET49944445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.720048904 CET49944445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:28.724797010 CET445499443.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:30.722793102 CET49977445192.168.2.624.92.19.8
                                  Jan 14, 2025 21:10:30.727642059 CET4454997724.92.19.8192.168.2.6
                                  Jan 14, 2025 21:10:30.729541063 CET49977445192.168.2.624.92.19.8
                                  Jan 14, 2025 21:10:30.730196953 CET49977445192.168.2.624.92.19.8
                                  Jan 14, 2025 21:10:30.730359077 CET49978445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.735065937 CET4454997724.92.19.8192.168.2.6
                                  Jan 14, 2025 21:10:30.735140085 CET49977445192.168.2.624.92.19.8
                                  Jan 14, 2025 21:10:30.735223055 CET4454997824.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:30.735285997 CET49978445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.738053083 CET49978445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.738431931 CET49979445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.742945910 CET4454997824.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:30.743309975 CET4454997924.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:30.743386030 CET49978445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.743415117 CET49979445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.746014118 CET49979445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:30.750881910 CET4454997924.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:32.510736942 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:32.510766029 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:32.510829926 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:32.511471033 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:32.511480093 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:32.736288071 CET50018445192.168.2.6122.76.227.232
                                  Jan 14, 2025 21:10:32.741112947 CET44550018122.76.227.232192.168.2.6
                                  Jan 14, 2025 21:10:32.741183043 CET50018445192.168.2.6122.76.227.232
                                  Jan 14, 2025 21:10:32.741224051 CET50018445192.168.2.6122.76.227.232
                                  Jan 14, 2025 21:10:32.741417885 CET50019445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.746275902 CET44550018122.76.227.232192.168.2.6
                                  Jan 14, 2025 21:10:32.746314049 CET44550019122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:32.746340036 CET50018445192.168.2.6122.76.227.232
                                  Jan 14, 2025 21:10:32.746396065 CET50019445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.746468067 CET50019445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.746737003 CET50020445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.751461983 CET44550019122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:32.751584053 CET44550020122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:32.751643896 CET50019445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.751666069 CET50020445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.751688957 CET50020445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:32.756604910 CET44550020122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:33.318038940 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.318218946 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.355243921 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.355262041 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.356069088 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.373734951 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.373734951 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.373752117 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.377363920 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.419327974 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.548222065 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.548363924 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.548696995 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.548717976 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.548737049 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:33.548743010 CET4435000940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:33.548896074 CET50009443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:34.751801014 CET50052445192.168.2.6201.2.58.244
                                  Jan 14, 2025 21:10:34.756661892 CET44550052201.2.58.244192.168.2.6
                                  Jan 14, 2025 21:10:34.756740093 CET50052445192.168.2.6201.2.58.244
                                  Jan 14, 2025 21:10:34.756773949 CET50052445192.168.2.6201.2.58.244
                                  Jan 14, 2025 21:10:34.756987095 CET50053445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.761766911 CET44550052201.2.58.244192.168.2.6
                                  Jan 14, 2025 21:10:34.761825085 CET50052445192.168.2.6201.2.58.244
                                  Jan 14, 2025 21:10:34.761879921 CET44550053201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:34.761955976 CET50053445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.761955976 CET50053445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.762206078 CET50054445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.766983986 CET44550053201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:34.767019987 CET44550054201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:34.767052889 CET50053445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.767087936 CET50054445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.767119884 CET50054445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:34.772002935 CET44550054201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:36.767765045 CET50092445192.168.2.6157.36.41.169
                                  Jan 14, 2025 21:10:36.772556067 CET44550092157.36.41.169192.168.2.6
                                  Jan 14, 2025 21:10:36.772682905 CET50092445192.168.2.6157.36.41.169
                                  Jan 14, 2025 21:10:36.772722960 CET50092445192.168.2.6157.36.41.169
                                  Jan 14, 2025 21:10:36.772850037 CET50093445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.777628899 CET44550093157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:36.777705908 CET50093445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.777728081 CET50093445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.777749062 CET44550092157.36.41.169192.168.2.6
                                  Jan 14, 2025 21:10:36.777800083 CET50092445192.168.2.6157.36.41.169
                                  Jan 14, 2025 21:10:36.778091908 CET50094445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.782676935 CET44550093157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:36.782737970 CET50093445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.782972097 CET44550094157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:36.783042908 CET50094445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.783087015 CET50094445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:36.787946939 CET44550094157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:38.783221960 CET50126445192.168.2.6161.197.61.54
                                  Jan 14, 2025 21:10:38.788052082 CET44550126161.197.61.54192.168.2.6
                                  Jan 14, 2025 21:10:38.788157940 CET50126445192.168.2.6161.197.61.54
                                  Jan 14, 2025 21:10:38.788239002 CET50126445192.168.2.6161.197.61.54
                                  Jan 14, 2025 21:10:38.788362026 CET50127445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.793092966 CET44550127161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:10:38.793190002 CET50127445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.793220997 CET50127445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.793240070 CET44550126161.197.61.54192.168.2.6
                                  Jan 14, 2025 21:10:38.793288946 CET50126445192.168.2.6161.197.61.54
                                  Jan 14, 2025 21:10:38.793540001 CET50128445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.798248053 CET44550127161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:10:38.798325062 CET50127445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.798413038 CET44550128161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:10:38.798485994 CET50128445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.798707962 CET50128445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:10:38.803442955 CET44550128161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:10:40.010818005 CET4454975958.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:40.010891914 CET49759445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:40.010962009 CET49759445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:40.011015892 CET49759445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:40.017158031 CET4454975958.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:40.017168045 CET4454975958.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:40.354726076 CET44549908201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:40.354785919 CET49908445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:40.354859114 CET49908445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:40.354918957 CET49908445192.168.2.6201.76.167.1
                                  Jan 14, 2025 21:10:40.359605074 CET44549908201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:40.359714031 CET44549908201.76.167.1192.168.2.6
                                  Jan 14, 2025 21:10:40.408359051 CET50154445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.413187981 CET44550154201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:10:40.413256884 CET50154445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.413360119 CET50154445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.413835049 CET50155445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.418699980 CET44550155201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:10:40.418764114 CET50155445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.418797970 CET50155445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.420311928 CET44550154201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:10:40.423532009 CET44550155201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:10:40.423693895 CET44550154201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:10:40.423738003 CET50154445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:10:40.800133944 CET50165445192.168.2.6119.177.148.84
                                  Jan 14, 2025 21:10:40.805186987 CET44550165119.177.148.84192.168.2.6
                                  Jan 14, 2025 21:10:40.805416107 CET50165445192.168.2.6119.177.148.84
                                  Jan 14, 2025 21:10:40.805417061 CET50165445192.168.2.6119.177.148.84
                                  Jan 14, 2025 21:10:40.805645943 CET50166445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.810658932 CET44550166119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:10:40.810847998 CET50166445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.810847998 CET50166445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.810945988 CET44550165119.177.148.84192.168.2.6
                                  Jan 14, 2025 21:10:40.811013937 CET50167445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.811153889 CET50165445192.168.2.6119.177.148.84
                                  Jan 14, 2025 21:10:40.815912008 CET44550167119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:10:40.815984964 CET50167445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.816030025 CET50167445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.816076040 CET44550166119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:10:40.816152096 CET50166445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:10:40.820981979 CET44550167119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:10:42.042092085 CET44549796180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:42.042208910 CET49796445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:42.042299032 CET49796445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:42.042332888 CET49796445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:42.047193050 CET44549796180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:42.047209024 CET44549796180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:42.814558029 CET50184445192.168.2.6124.104.82.171
                                  Jan 14, 2025 21:10:42.819758892 CET44550184124.104.82.171192.168.2.6
                                  Jan 14, 2025 21:10:42.819845915 CET50184445192.168.2.6124.104.82.171
                                  Jan 14, 2025 21:10:42.819890976 CET50184445192.168.2.6124.104.82.171
                                  Jan 14, 2025 21:10:42.820075035 CET50185445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.824964046 CET44550185124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:10:42.825046062 CET50185445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.825063944 CET44550184124.104.82.171192.168.2.6
                                  Jan 14, 2025 21:10:42.825067997 CET50185445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.825119972 CET50184445192.168.2.6124.104.82.171
                                  Jan 14, 2025 21:10:42.825433016 CET50186445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.830055952 CET44550185124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:10:42.830116987 CET50185445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.830306053 CET44550186124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:10:42.830365896 CET50186445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.830403090 CET50186445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:10:42.835228920 CET44550186124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:10:43.017400026 CET50187445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:43.022331953 CET4455018758.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:43.022418022 CET50187445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:43.022501945 CET50187445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:10:43.027256966 CET4455018758.86.16.1192.168.2.6
                                  Jan 14, 2025 21:10:44.028295994 CET44549832209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:44.028959036 CET49832445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:44.028959036 CET49832445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:44.028959036 CET49832445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:44.033839941 CET44549832209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:44.033854961 CET44549832209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:44.829843998 CET50199445192.168.2.6157.41.84.44
                                  Jan 14, 2025 21:10:44.834625006 CET44550199157.41.84.44192.168.2.6
                                  Jan 14, 2025 21:10:44.834695101 CET50199445192.168.2.6157.41.84.44
                                  Jan 14, 2025 21:10:44.834722042 CET50199445192.168.2.6157.41.84.44
                                  Jan 14, 2025 21:10:44.835021019 CET50200445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.839855909 CET44550200157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:10:44.839993000 CET50200445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.840044022 CET50200445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.840260029 CET44550199157.41.84.44192.168.2.6
                                  Jan 14, 2025 21:10:44.840493917 CET44550199157.41.84.44192.168.2.6
                                  Jan 14, 2025 21:10:44.840543032 CET50199445192.168.2.6157.41.84.44
                                  Jan 14, 2025 21:10:44.840617895 CET50202445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.845216036 CET44550200157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:10:44.845370054 CET50200445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.845489979 CET44550202157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:10:44.845748901 CET50202445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.845748901 CET50202445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:10:44.850544930 CET44550202157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:10:45.048652887 CET50206445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:45.053673029 CET44550206180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:45.053853989 CET50206445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:45.053853989 CET50206445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:10:45.058752060 CET44550206180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:10:45.858990908 CET44349894173.222.162.64192.168.2.6
                                  Jan 14, 2025 21:10:45.859045982 CET49894443192.168.2.6173.222.162.64
                                  Jan 14, 2025 21:10:46.042248011 CET4454986786.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:46.043092966 CET49867445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:46.043212891 CET49867445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:46.043212891 CET49867445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:46.048146009 CET4454986786.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:46.048160076 CET4454986786.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:46.845859051 CET50217445192.168.2.617.184.225.126
                                  Jan 14, 2025 21:10:46.850656033 CET4455021717.184.225.126192.168.2.6
                                  Jan 14, 2025 21:10:46.850765944 CET50217445192.168.2.617.184.225.126
                                  Jan 14, 2025 21:10:46.850805998 CET50217445192.168.2.617.184.225.126
                                  Jan 14, 2025 21:10:46.850959063 CET50218445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.855756044 CET4455021717.184.225.126192.168.2.6
                                  Jan 14, 2025 21:10:46.855771065 CET4455021817.184.225.1192.168.2.6
                                  Jan 14, 2025 21:10:46.855837107 CET50217445192.168.2.617.184.225.126
                                  Jan 14, 2025 21:10:46.855876923 CET50218445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.855940104 CET50218445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.856290102 CET50219445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.860944986 CET4455021817.184.225.1192.168.2.6
                                  Jan 14, 2025 21:10:46.861051083 CET50218445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.861138105 CET4455021917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:10:46.861212969 CET50219445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.861258030 CET50219445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:10:46.866337061 CET4455021917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:10:47.033030987 CET50220445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:47.037825108 CET44550220209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:47.037955999 CET50220445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:47.038043976 CET50220445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:10:47.042812109 CET44550220209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:10:48.057771921 CET44549907117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:48.057848930 CET49907445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:48.057909966 CET49907445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:48.057987928 CET49907445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:48.062625885 CET44549907117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:48.062736988 CET44549907117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:48.861429930 CET50232445192.168.2.6169.16.157.23
                                  Jan 14, 2025 21:10:48.866261959 CET44550232169.16.157.23192.168.2.6
                                  Jan 14, 2025 21:10:48.866348982 CET50232445192.168.2.6169.16.157.23
                                  Jan 14, 2025 21:10:48.866393089 CET50232445192.168.2.6169.16.157.23
                                  Jan 14, 2025 21:10:48.866549969 CET50235445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.871424913 CET44550235169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:10:48.871582031 CET50235445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.871582031 CET50235445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.871701956 CET44550232169.16.157.23192.168.2.6
                                  Jan 14, 2025 21:10:48.871843100 CET50232445192.168.2.6169.16.157.23
                                  Jan 14, 2025 21:10:48.871959925 CET50236445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.876547098 CET44550235169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:10:48.876611948 CET50235445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.876744986 CET44550236169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:10:48.876808882 CET50236445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.876847029 CET50236445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:10:48.881679058 CET44550236169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:10:49.048599958 CET50239445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:49.053627968 CET4455023986.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:49.053749084 CET50239445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:49.053795099 CET50239445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:10:49.058579922 CET4455023986.146.125.1192.168.2.6
                                  Jan 14, 2025 21:10:50.090172052 CET445499443.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:50.090435982 CET49944445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:50.090435982 CET49944445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:50.090436935 CET49944445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:50.095410109 CET445499443.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:50.095422983 CET445499443.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:50.877346992 CET50250445192.168.2.6191.205.25.2
                                  Jan 14, 2025 21:10:50.882713079 CET44550250191.205.25.2192.168.2.6
                                  Jan 14, 2025 21:10:50.882874012 CET50250445192.168.2.6191.205.25.2
                                  Jan 14, 2025 21:10:50.882874012 CET50250445192.168.2.6191.205.25.2
                                  Jan 14, 2025 21:10:50.883116007 CET50251445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.888117075 CET44550250191.205.25.2192.168.2.6
                                  Jan 14, 2025 21:10:50.888164043 CET44550251191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:10:50.888245106 CET50250445192.168.2.6191.205.25.2
                                  Jan 14, 2025 21:10:50.888323069 CET50251445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.888488054 CET50251445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.888950109 CET50252445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.893415928 CET44550251191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:10:50.893515110 CET50251445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.893836021 CET44550252191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:10:50.893915892 CET50252445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.893939972 CET50252445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:10:50.898811102 CET44550252191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:10:51.064081907 CET50253445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:51.069041967 CET44550253117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:51.069148064 CET50253445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:51.069269896 CET50253445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:10:51.074057102 CET44550253117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:10:51.899110079 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:51.899148941 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:51.899229050 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:51.899836063 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:51.899849892 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.104841948 CET4454997924.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:52.105700016 CET49979445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:52.106487989 CET49979445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:52.106522083 CET49979445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:52.111394882 CET4454997924.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:52.111426115 CET4454997924.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:52.704615116 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.704684973 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.706573963 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.706584930 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.706855059 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.708762884 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.708820105 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.708826065 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.708967924 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.751847982 CET50265445192.168.2.6217.202.110.65
                                  Jan 14, 2025 21:10:52.755325079 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.756745100 CET44550265217.202.110.65192.168.2.6
                                  Jan 14, 2025 21:10:52.756823063 CET50265445192.168.2.6217.202.110.65
                                  Jan 14, 2025 21:10:52.756860018 CET50265445192.168.2.6217.202.110.65
                                  Jan 14, 2025 21:10:52.757103920 CET50266445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.761842966 CET44550265217.202.110.65192.168.2.6
                                  Jan 14, 2025 21:10:52.761905909 CET50265445192.168.2.6217.202.110.65
                                  Jan 14, 2025 21:10:52.761975050 CET44550266217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:10:52.762053013 CET50266445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.762126923 CET50266445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.762496948 CET50267445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.767036915 CET44550266217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:10:52.767093897 CET50266445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.767292976 CET44550267217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:10:52.767395020 CET50267445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.767416000 CET50267445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:10:52.772377968 CET44550267217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:10:52.883261919 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.883490086 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.883557081 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.883785009 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:52.883797884 CET4435025940.113.103.199192.168.2.6
                                  Jan 14, 2025 21:10:52.883810997 CET50259443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:10:53.095283031 CET50273445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:53.100166082 CET445502733.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:53.100265026 CET50273445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:53.100306034 CET50273445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:10:53.105055094 CET445502733.107.178.1192.168.2.6
                                  Jan 14, 2025 21:10:54.122632980 CET44550020122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:54.122700930 CET50020445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:54.122742891 CET50020445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:54.122790098 CET50020445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:54.127568960 CET44550020122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:54.127587080 CET44550020122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:54.501677036 CET50281445192.168.2.669.97.150.45
                                  Jan 14, 2025 21:10:54.506575108 CET4455028169.97.150.45192.168.2.6
                                  Jan 14, 2025 21:10:54.506650925 CET50281445192.168.2.669.97.150.45
                                  Jan 14, 2025 21:10:54.506726980 CET50281445192.168.2.669.97.150.45
                                  Jan 14, 2025 21:10:54.506875992 CET50282445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.511615992 CET4455028169.97.150.45192.168.2.6
                                  Jan 14, 2025 21:10:54.511653900 CET4455028269.97.150.1192.168.2.6
                                  Jan 14, 2025 21:10:54.511666059 CET50281445192.168.2.669.97.150.45
                                  Jan 14, 2025 21:10:54.511717081 CET50282445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.511778116 CET50282445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.512032032 CET50283445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.516630888 CET4455028269.97.150.1192.168.2.6
                                  Jan 14, 2025 21:10:54.516679049 CET50282445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.516864061 CET4455028369.97.150.1192.168.2.6
                                  Jan 14, 2025 21:10:54.516999960 CET50283445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.517081022 CET50283445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:10:54.521859884 CET4455028369.97.150.1192.168.2.6
                                  Jan 14, 2025 21:10:55.111023903 CET50287445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:55.115895033 CET4455028724.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:55.116014957 CET50287445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:55.116211891 CET50287445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:10:55.121015072 CET4455028724.92.19.1192.168.2.6
                                  Jan 14, 2025 21:10:56.137974977 CET44550054201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:56.138127089 CET50054445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:56.138221979 CET50054445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:56.138221979 CET50054445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:56.142430067 CET50296445192.168.2.68.157.50.194
                                  Jan 14, 2025 21:10:56.143121004 CET44550054201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:56.143152952 CET44550054201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:56.147444963 CET445502968.157.50.194192.168.2.6
                                  Jan 14, 2025 21:10:56.147556067 CET50296445192.168.2.68.157.50.194
                                  Jan 14, 2025 21:10:56.147556067 CET50296445192.168.2.68.157.50.194
                                  Jan 14, 2025 21:10:56.147690058 CET50297445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.152618885 CET445502978.157.50.1192.168.2.6
                                  Jan 14, 2025 21:10:56.152651072 CET445502968.157.50.194192.168.2.6
                                  Jan 14, 2025 21:10:56.152684927 CET50297445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.152767897 CET50296445192.168.2.68.157.50.194
                                  Jan 14, 2025 21:10:56.152827024 CET50297445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.153090954 CET50298445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.157773972 CET445502978.157.50.1192.168.2.6
                                  Jan 14, 2025 21:10:56.157840014 CET50297445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.157975912 CET445502988.157.50.1192.168.2.6
                                  Jan 14, 2025 21:10:56.158044100 CET50298445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.158083916 CET50298445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:10:56.162902117 CET445502988.157.50.1192.168.2.6
                                  Jan 14, 2025 21:10:57.126756907 CET50306445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:57.131721020 CET44550306122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:57.131831884 CET50306445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:57.131872892 CET50306445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:10:57.136691093 CET44550306122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:10:57.673790932 CET50309445192.168.2.634.177.88.54
                                  Jan 14, 2025 21:10:57.678625107 CET4455030934.177.88.54192.168.2.6
                                  Jan 14, 2025 21:10:57.678677082 CET50309445192.168.2.634.177.88.54
                                  Jan 14, 2025 21:10:57.678750038 CET50309445192.168.2.634.177.88.54
                                  Jan 14, 2025 21:10:57.678896904 CET50310445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.683594942 CET4455030934.177.88.54192.168.2.6
                                  Jan 14, 2025 21:10:57.683670044 CET50309445192.168.2.634.177.88.54
                                  Jan 14, 2025 21:10:57.683677912 CET4455031034.177.88.1192.168.2.6
                                  Jan 14, 2025 21:10:57.683727980 CET50310445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.683804989 CET50310445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.684134960 CET50311445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.688647985 CET4455031034.177.88.1192.168.2.6
                                  Jan 14, 2025 21:10:57.688710928 CET50310445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.688922882 CET4455031134.177.88.1192.168.2.6
                                  Jan 14, 2025 21:10:57.688975096 CET50311445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.689008951 CET50311445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:10:57.693737030 CET4455031134.177.88.1192.168.2.6
                                  Jan 14, 2025 21:10:58.136357069 CET44550094157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:58.136501074 CET50094445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:58.136555910 CET50094445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:10:58.141437054 CET44550094157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:58.141468048 CET44550094157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:10:59.095840931 CET50320445192.168.2.6174.157.161.26
                                  Jan 14, 2025 21:10:59.100790024 CET44550320174.157.161.26192.168.2.6
                                  Jan 14, 2025 21:10:59.100930929 CET50320445192.168.2.6174.157.161.26
                                  Jan 14, 2025 21:10:59.100970030 CET50320445192.168.2.6174.157.161.26
                                  Jan 14, 2025 21:10:59.101100922 CET50321445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.106064081 CET44550321174.157.161.1192.168.2.6
                                  Jan 14, 2025 21:10:59.106197119 CET50321445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.106235981 CET50321445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.106271029 CET44550320174.157.161.26192.168.2.6
                                  Jan 14, 2025 21:10:59.106328964 CET50320445192.168.2.6174.157.161.26
                                  Jan 14, 2025 21:10:59.106542110 CET50322445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.111486912 CET44550321174.157.161.1192.168.2.6
                                  Jan 14, 2025 21:10:59.111538887 CET44550322174.157.161.1192.168.2.6
                                  Jan 14, 2025 21:10:59.111596107 CET50321445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.111639023 CET50322445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.111681938 CET50322445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:10:59.116569996 CET44550322174.157.161.1192.168.2.6
                                  Jan 14, 2025 21:10:59.142338991 CET50324445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:59.147279978 CET44550324201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:10:59.147447109 CET50324445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:59.147495031 CET50324445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:10:59.152340889 CET44550324201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:11:00.183242083 CET44550128161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:11:00.183716059 CET50128445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:00.183978081 CET50128445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:00.184073925 CET50128445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:00.188750982 CET44550128161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:11:00.188844919 CET44550128161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:11:00.424030066 CET50328445192.168.2.6179.57.103.242
                                  Jan 14, 2025 21:11:00.429065943 CET44550328179.57.103.242192.168.2.6
                                  Jan 14, 2025 21:11:00.429130077 CET50328445192.168.2.6179.57.103.242
                                  Jan 14, 2025 21:11:00.429162025 CET50328445192.168.2.6179.57.103.242
                                  Jan 14, 2025 21:11:00.429335117 CET50329445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.434119940 CET44550328179.57.103.242192.168.2.6
                                  Jan 14, 2025 21:11:00.434166908 CET44550329179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:00.434170961 CET50328445192.168.2.6179.57.103.242
                                  Jan 14, 2025 21:11:00.434214115 CET50329445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.434278965 CET50329445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.434766054 CET50330445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.439179897 CET44550329179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:00.439239025 CET50329445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.439543962 CET44550330179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:00.439610958 CET50330445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.439637899 CET50330445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:00.444395065 CET44550330179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:01.142280102 CET50331445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:11:01.147250891 CET44550331157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:11:01.147362947 CET50331445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:11:01.147382975 CET50331445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:11:01.152195930 CET44550331157.36.41.1192.168.2.6
                                  Jan 14, 2025 21:11:01.658456087 CET50332445192.168.2.699.232.175.113
                                  Jan 14, 2025 21:11:01.663542986 CET4455033299.232.175.113192.168.2.6
                                  Jan 14, 2025 21:11:01.663644075 CET50332445192.168.2.699.232.175.113
                                  Jan 14, 2025 21:11:01.663680077 CET50332445192.168.2.699.232.175.113
                                  Jan 14, 2025 21:11:01.663764000 CET50333445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.668735981 CET4455033399.232.175.1192.168.2.6
                                  Jan 14, 2025 21:11:01.668919086 CET50333445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.668919086 CET50333445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.669325113 CET50334445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.670841932 CET4455033299.232.175.113192.168.2.6
                                  Jan 14, 2025 21:11:01.670907021 CET50332445192.168.2.699.232.175.113
                                  Jan 14, 2025 21:11:01.673885107 CET4455033399.232.175.1192.168.2.6
                                  Jan 14, 2025 21:11:01.673942089 CET50333445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.674180031 CET4455033499.232.175.1192.168.2.6
                                  Jan 14, 2025 21:11:01.674237013 CET50334445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.674295902 CET50334445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:01.679075003 CET4455033499.232.175.1192.168.2.6
                                  Jan 14, 2025 21:11:01.777046919 CET44550155201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:11:01.777188063 CET50155445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:01.777246952 CET50155445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:01.777288914 CET50155445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:01.782061100 CET44550155201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:11:01.782073975 CET44550155201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:11:02.249850035 CET44550330179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:02.249898911 CET44550167119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:11:02.250036955 CET50330445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:02.250144958 CET50167445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:02.250144958 CET50167445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:02.250211954 CET50167445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:02.250216007 CET50330445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:02.250288963 CET50330445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:02.255165100 CET44550167119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:11:02.255196095 CET44550167119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:11:02.255223989 CET44550330179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:02.255251884 CET44550330179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:02.819565058 CET50336445192.168.2.6223.113.3.169
                                  Jan 14, 2025 21:11:02.824610949 CET44550336223.113.3.169192.168.2.6
                                  Jan 14, 2025 21:11:02.824759960 CET50336445192.168.2.6223.113.3.169
                                  Jan 14, 2025 21:11:02.824851990 CET50336445192.168.2.6223.113.3.169
                                  Jan 14, 2025 21:11:02.825011015 CET50337445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.830055952 CET44550336223.113.3.169192.168.2.6
                                  Jan 14, 2025 21:11:02.830081940 CET44550337223.113.3.1192.168.2.6
                                  Jan 14, 2025 21:11:02.830143929 CET50336445192.168.2.6223.113.3.169
                                  Jan 14, 2025 21:11:02.830177069 CET50337445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.830276966 CET50337445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.830889940 CET50338445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.835206985 CET44550337223.113.3.1192.168.2.6
                                  Jan 14, 2025 21:11:02.835285902 CET50337445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.835736036 CET44550338223.113.3.1192.168.2.6
                                  Jan 14, 2025 21:11:02.835817099 CET50338445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.835848093 CET50338445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:02.840688944 CET44550338223.113.3.1192.168.2.6
                                  Jan 14, 2025 21:11:03.194598913 CET50339445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:03.199717999 CET44550339161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:11:03.199841022 CET50339445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:03.205420017 CET50339445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:03.210297108 CET44550339161.197.61.1192.168.2.6
                                  Jan 14, 2025 21:11:03.908169985 CET50340445192.168.2.643.112.215.82
                                  Jan 14, 2025 21:11:03.913254976 CET4455034043.112.215.82192.168.2.6
                                  Jan 14, 2025 21:11:03.913366079 CET50340445192.168.2.643.112.215.82
                                  Jan 14, 2025 21:11:03.913428068 CET50340445192.168.2.643.112.215.82
                                  Jan 14, 2025 21:11:03.913568020 CET50341445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.918493986 CET4455034143.112.215.1192.168.2.6
                                  Jan 14, 2025 21:11:03.918525934 CET4455034043.112.215.82192.168.2.6
                                  Jan 14, 2025 21:11:03.918622017 CET50340445192.168.2.643.112.215.82
                                  Jan 14, 2025 21:11:03.918684006 CET50341445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.918684006 CET50341445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.918956995 CET50342445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.923769951 CET4455034143.112.215.1192.168.2.6
                                  Jan 14, 2025 21:11:03.923825026 CET4455034243.112.215.1192.168.2.6
                                  Jan 14, 2025 21:11:03.923897982 CET50341445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.923950911 CET50342445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.923950911 CET50342445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:03.928755999 CET4455034243.112.215.1192.168.2.6
                                  Jan 14, 2025 21:11:04.247169971 CET44550186124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:11:04.247333050 CET50186445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:04.247395039 CET50186445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:04.247417927 CET50186445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:04.252192974 CET44550186124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:11:04.252208948 CET44550186124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:11:04.372376919 CET4455018758.86.16.1192.168.2.6
                                  Jan 14, 2025 21:11:04.375684977 CET50187445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:11:04.375803947 CET50187445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:11:04.375803947 CET50187445192.168.2.658.86.16.1
                                  Jan 14, 2025 21:11:04.380706072 CET4455018758.86.16.1192.168.2.6
                                  Jan 14, 2025 21:11:04.380728960 CET4455018758.86.16.1192.168.2.6
                                  Jan 14, 2025 21:11:04.439337015 CET50343445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.444247007 CET4455034358.86.16.2192.168.2.6
                                  Jan 14, 2025 21:11:04.444489956 CET50343445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.444525957 CET50343445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.444869041 CET50344445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.449482918 CET4455034358.86.16.2192.168.2.6
                                  Jan 14, 2025 21:11:04.449538946 CET50343445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.449681044 CET4455034458.86.16.2192.168.2.6
                                  Jan 14, 2025 21:11:04.449733973 CET50344445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.449754000 CET50344445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:04.454535007 CET4455034458.86.16.2192.168.2.6
                                  Jan 14, 2025 21:11:04.782929897 CET50345445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:04.788003922 CET44550345201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:11:04.789279938 CET50345445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:04.789470911 CET50345445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:04.794472933 CET44550345201.76.167.2192.168.2.6
                                  Jan 14, 2025 21:11:04.924056053 CET50346445192.168.2.680.251.87.82
                                  Jan 14, 2025 21:11:04.928989887 CET4455034680.251.87.82192.168.2.6
                                  Jan 14, 2025 21:11:04.929174900 CET50346445192.168.2.680.251.87.82
                                  Jan 14, 2025 21:11:04.929174900 CET50346445192.168.2.680.251.87.82
                                  Jan 14, 2025 21:11:04.929394960 CET50347445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.934218884 CET4455034680.251.87.82192.168.2.6
                                  Jan 14, 2025 21:11:04.934266090 CET4455034780.251.87.1192.168.2.6
                                  Jan 14, 2025 21:11:04.934340954 CET50347445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.934462070 CET50347445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.934526920 CET50346445192.168.2.680.251.87.82
                                  Jan 14, 2025 21:11:04.934802055 CET50348445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.939400911 CET4455034780.251.87.1192.168.2.6
                                  Jan 14, 2025 21:11:04.939462900 CET50347445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.939732075 CET4455034880.251.87.1192.168.2.6
                                  Jan 14, 2025 21:11:04.939795017 CET50348445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.939829111 CET50348445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:04.944618940 CET4455034880.251.87.1192.168.2.6
                                  Jan 14, 2025 21:11:05.252556086 CET50350445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:05.252572060 CET50349445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:05.257653952 CET44550350119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:11:05.257702112 CET44550349179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:05.257766962 CET50350445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:05.257807016 CET50349445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:05.257837057 CET50349445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:05.257839918 CET50350445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:05.262684107 CET44550350119.177.148.1192.168.2.6
                                  Jan 14, 2025 21:11:05.262871981 CET44550349179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:05.935332060 CET50351445192.168.2.6205.115.6.193
                                  Jan 14, 2025 21:11:05.940376997 CET44550351205.115.6.193192.168.2.6
                                  Jan 14, 2025 21:11:05.940541029 CET50351445192.168.2.6205.115.6.193
                                  Jan 14, 2025 21:11:05.940541029 CET50351445192.168.2.6205.115.6.193
                                  Jan 14, 2025 21:11:05.940701008 CET50352445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.945559025 CET44550352205.115.6.1192.168.2.6
                                  Jan 14, 2025 21:11:05.945630074 CET50352445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.945657969 CET50352445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.945763111 CET44550351205.115.6.193192.168.2.6
                                  Jan 14, 2025 21:11:05.945825100 CET50351445192.168.2.6205.115.6.193
                                  Jan 14, 2025 21:11:05.946069002 CET50353445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.950720072 CET44550352205.115.6.1192.168.2.6
                                  Jan 14, 2025 21:11:05.950777054 CET50352445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.950879097 CET44550353205.115.6.1192.168.2.6
                                  Jan 14, 2025 21:11:05.950934887 CET50353445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.950967073 CET50353445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:05.955821991 CET44550353205.115.6.1192.168.2.6
                                  Jan 14, 2025 21:11:06.248270988 CET44550202157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:11:06.248452902 CET50202445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:06.248610020 CET50202445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:06.248666048 CET50202445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:06.253510952 CET44550202157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:11:06.253546000 CET44550202157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:11:06.450900078 CET44550206180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:11:06.451112032 CET50206445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:11:06.452178955 CET50206445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:11:06.452246904 CET50206445192.168.2.6180.95.118.1
                                  Jan 14, 2025 21:11:06.457011938 CET44550206180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:11:06.457046032 CET44550206180.95.118.1192.168.2.6
                                  Jan 14, 2025 21:11:06.517257929 CET50354445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.522488117 CET44550354180.95.118.2192.168.2.6
                                  Jan 14, 2025 21:11:06.522562027 CET50354445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.522593021 CET50354445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.523030996 CET50355445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.527714014 CET44550354180.95.118.2192.168.2.6
                                  Jan 14, 2025 21:11:06.527771950 CET50354445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.527947903 CET44550355180.95.118.2192.168.2.6
                                  Jan 14, 2025 21:11:06.528048992 CET50355445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.528048992 CET50355445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:06.532885075 CET44550355180.95.118.2192.168.2.6
                                  Jan 14, 2025 21:11:06.814605951 CET50356445192.168.2.6101.240.13.197
                                  Jan 14, 2025 21:11:06.819519043 CET44550356101.240.13.197192.168.2.6
                                  Jan 14, 2025 21:11:06.819617987 CET50356445192.168.2.6101.240.13.197
                                  Jan 14, 2025 21:11:06.819715023 CET50356445192.168.2.6101.240.13.197
                                  Jan 14, 2025 21:11:06.821326017 CET50357445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.824807882 CET44550356101.240.13.197192.168.2.6
                                  Jan 14, 2025 21:11:06.824898005 CET50356445192.168.2.6101.240.13.197
                                  Jan 14, 2025 21:11:06.826194048 CET44550357101.240.13.1192.168.2.6
                                  Jan 14, 2025 21:11:06.826361895 CET50357445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.826361895 CET50357445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.826674938 CET50358445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.831302881 CET44550357101.240.13.1192.168.2.6
                                  Jan 14, 2025 21:11:06.831476927 CET50357445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.831541061 CET44550358101.240.13.1192.168.2.6
                                  Jan 14, 2025 21:11:06.831614017 CET50358445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.831650972 CET50358445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:06.836529016 CET44550358101.240.13.1192.168.2.6
                                  Jan 14, 2025 21:11:07.062690973 CET44550349179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:07.062851906 CET50349445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:07.062927008 CET50349445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:07.062995911 CET50349445192.168.2.6179.57.103.1
                                  Jan 14, 2025 21:11:07.067749977 CET44550349179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:07.067790985 CET44550349179.57.103.1192.168.2.6
                                  Jan 14, 2025 21:11:07.126718044 CET50359445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.131666899 CET44550359179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:07.131763935 CET50359445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.131890059 CET50359445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.135335922 CET50360445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.136826038 CET44550359179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:07.136890888 CET50359445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.140151978 CET44550360179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:07.143338919 CET50360445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.143340111 CET50360445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:07.148261070 CET44550360179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:07.251928091 CET50361445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:07.256819010 CET44550361124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:11:07.256944895 CET50361445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:07.256968021 CET50361445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:07.261817932 CET44550361124.104.82.1192.168.2.6
                                  Jan 14, 2025 21:11:07.642582893 CET50362445192.168.2.6112.117.58.143
                                  Jan 14, 2025 21:11:07.647722006 CET44550362112.117.58.143192.168.2.6
                                  Jan 14, 2025 21:11:07.647845984 CET50362445192.168.2.6112.117.58.143
                                  Jan 14, 2025 21:11:07.647895098 CET50362445192.168.2.6112.117.58.143
                                  Jan 14, 2025 21:11:07.648400068 CET50363445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.652970076 CET44550362112.117.58.143192.168.2.6
                                  Jan 14, 2025 21:11:07.653038025 CET50362445192.168.2.6112.117.58.143
                                  Jan 14, 2025 21:11:07.653302908 CET44550363112.117.58.1192.168.2.6
                                  Jan 14, 2025 21:11:07.653664112 CET50364445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.654191017 CET50363445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.654191017 CET50363445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.658601046 CET44550364112.117.58.1192.168.2.6
                                  Jan 14, 2025 21:11:07.658685923 CET50364445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.658710003 CET50364445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.659178019 CET44550363112.117.58.1192.168.2.6
                                  Jan 14, 2025 21:11:07.659260988 CET50363445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:07.663582087 CET44550364112.117.58.1192.168.2.6
                                  Jan 14, 2025 21:11:08.249938965 CET4455021917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:11:08.250130892 CET50219445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:08.302443027 CET50219445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:08.302443027 CET50219445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:08.307710886 CET4455021917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:11:08.307756901 CET4455021917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:11:08.417208910 CET50365445192.168.2.678.71.117.88
                                  Jan 14, 2025 21:11:08.422358990 CET4455036578.71.117.88192.168.2.6
                                  Jan 14, 2025 21:11:08.422442913 CET50365445192.168.2.678.71.117.88
                                  Jan 14, 2025 21:11:08.425249100 CET50365445192.168.2.678.71.117.88
                                  Jan 14, 2025 21:11:08.425504923 CET50366445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.430185080 CET4455036578.71.117.88192.168.2.6
                                  Jan 14, 2025 21:11:08.430247068 CET50365445192.168.2.678.71.117.88
                                  Jan 14, 2025 21:11:08.430670977 CET4455036678.71.117.1192.168.2.6
                                  Jan 14, 2025 21:11:08.430841923 CET50366445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.433526039 CET50366445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.437881947 CET50367445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.439682961 CET4455036678.71.117.1192.168.2.6
                                  Jan 14, 2025 21:11:08.439780951 CET50366445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.442861080 CET4455036778.71.117.1192.168.2.6
                                  Jan 14, 2025 21:11:08.442928076 CET50367445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.445903063 CET50367445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:08.450776100 CET4455036778.71.117.1192.168.2.6
                                  Jan 14, 2025 21:11:08.455298901 CET44550220209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:11:08.455380917 CET50220445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:11:08.458317995 CET50220445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:11:08.458475113 CET50220445192.168.2.6209.29.139.1
                                  Jan 14, 2025 21:11:08.463392973 CET44550220209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:11:08.463423967 CET44550220209.29.139.1192.168.2.6
                                  Jan 14, 2025 21:11:08.527470112 CET50368445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.532701015 CET44550368209.29.139.2192.168.2.6
                                  Jan 14, 2025 21:11:08.532799006 CET50368445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.533291101 CET50368445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.538224936 CET44550368209.29.139.2192.168.2.6
                                  Jan 14, 2025 21:11:08.538315058 CET50368445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.538789034 CET50369445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.543649912 CET44550369209.29.139.2192.168.2.6
                                  Jan 14, 2025 21:11:08.543714046 CET50369445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.546386957 CET50369445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:08.551242113 CET44550369209.29.139.2192.168.2.6
                                  Jan 14, 2025 21:11:08.975024939 CET44550360179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:08.975173950 CET50360445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:08.975212097 CET50360445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:08.975245953 CET50360445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:08.980904102 CET44550360179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:08.980935097 CET44550360179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:09.251590014 CET50371445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:09.256772041 CET44550371157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:11:09.256876945 CET50371445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:09.256941080 CET50371445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:09.261863947 CET44550371157.41.84.1192.168.2.6
                                  Jan 14, 2025 21:11:10.263484001 CET44550236169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:11:10.263585091 CET50236445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:10.263643026 CET50236445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:10.263643026 CET50236445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:10.268501043 CET44550236169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:11:10.268598080 CET44550236169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:11:10.437859058 CET4455023986.146.125.1192.168.2.6
                                  Jan 14, 2025 21:11:10.438123941 CET50239445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:11:10.438195944 CET50239445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:11:10.438195944 CET50239445192.168.2.686.146.125.1
                                  Jan 14, 2025 21:11:10.443115950 CET4455023986.146.125.1192.168.2.6
                                  Jan 14, 2025 21:11:10.443149090 CET4455023986.146.125.1192.168.2.6
                                  Jan 14, 2025 21:11:10.501705885 CET50375445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.507206917 CET4455037586.146.125.2192.168.2.6
                                  Jan 14, 2025 21:11:10.507308960 CET50375445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.507328987 CET50375445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.507546902 CET50376445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.512506008 CET4455037586.146.125.2192.168.2.6
                                  Jan 14, 2025 21:11:10.512691975 CET4455037686.146.125.2192.168.2.6
                                  Jan 14, 2025 21:11:10.512722015 CET4455037586.146.125.2192.168.2.6
                                  Jan 14, 2025 21:11:10.512751102 CET50376445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.512768984 CET50375445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.512809038 CET50376445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:10.517787933 CET4455037686.146.125.2192.168.2.6
                                  Jan 14, 2025 21:11:11.314146996 CET50379445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:11.319542885 CET4455037917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:11:11.319696903 CET50379445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:11.319722891 CET50379445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:11.324613094 CET4455037917.184.225.1192.168.2.6
                                  Jan 14, 2025 21:11:11.986006021 CET50383445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:11.991410017 CET44550383179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:11.991604090 CET50383445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:11.991640091 CET50383445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:11.996531963 CET44550383179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:12.293966055 CET44550252191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:11:12.294182062 CET50252445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:12.294224977 CET50252445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:12.294275999 CET50252445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:12.299186945 CET44550252191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:11:12.299220085 CET44550252191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:11:12.437517881 CET44550253117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:11:12.437848091 CET50253445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:11:12.437973022 CET50253445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:11:12.438041925 CET50253445192.168.2.6117.201.167.1
                                  Jan 14, 2025 21:11:12.442790985 CET44550253117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:11:12.442850113 CET44550253117.201.167.1192.168.2.6
                                  Jan 14, 2025 21:11:12.501760960 CET50388445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:12.507041931 CET44550388117.201.167.2192.168.2.6
                                  Jan 14, 2025 21:11:12.507128954 CET50388445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:12.507143974 CET50388445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:12.507467031 CET50389445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:12.512388945 CET44550389117.201.167.2192.168.2.6
                                  Jan 14, 2025 21:11:12.512476921 CET50389445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:12.512518883 CET50389445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:12.516309977 CET44550388117.201.167.2192.168.2.6
                                  Jan 14, 2025 21:11:12.517353058 CET44550389117.201.167.2192.168.2.6
                                  Jan 14, 2025 21:11:12.534326077 CET44550388117.201.167.2192.168.2.6
                                  Jan 14, 2025 21:11:12.534441948 CET50388445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:13.267369032 CET50397445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:13.272689104 CET44550397169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:11:13.272804022 CET50397445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:13.272831917 CET50397445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:13.277723074 CET44550397169.16.157.1192.168.2.6
                                  Jan 14, 2025 21:11:13.858581066 CET44550383179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:13.858747005 CET50383445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:13.858819008 CET50383445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:13.858859062 CET50383445192.168.2.6179.57.103.2
                                  Jan 14, 2025 21:11:13.863756895 CET44550383179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:13.863790035 CET44550383179.57.103.2192.168.2.6
                                  Jan 14, 2025 21:11:13.923583984 CET50404445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.928735971 CET44550404179.57.103.3192.168.2.6
                                  Jan 14, 2025 21:11:13.928890944 CET50404445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.928936958 CET50404445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.929294109 CET50405445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.934179068 CET44550405179.57.103.3192.168.2.6
                                  Jan 14, 2025 21:11:13.934283972 CET50405445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.934324980 CET44550404179.57.103.3192.168.2.6
                                  Jan 14, 2025 21:11:13.934341908 CET50405445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.934389114 CET50404445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:13.939172029 CET44550405179.57.103.3192.168.2.6
                                  Jan 14, 2025 21:11:14.140642881 CET44550267217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:11:14.140716076 CET50267445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:14.140754938 CET50267445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:14.140796900 CET50267445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:14.145714045 CET44550267217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:11:14.145745993 CET44550267217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:11:14.467886925 CET445502733.107.178.1192.168.2.6
                                  Jan 14, 2025 21:11:14.468132973 CET50273445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:11:14.468336105 CET50273445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:11:14.468437910 CET50273445192.168.2.63.107.178.1
                                  Jan 14, 2025 21:11:14.473153114 CET445502733.107.178.1192.168.2.6
                                  Jan 14, 2025 21:11:14.473272085 CET445502733.107.178.1192.168.2.6
                                  Jan 14, 2025 21:11:14.532838106 CET50413445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.538042068 CET445504133.107.178.2192.168.2.6
                                  Jan 14, 2025 21:11:14.538124084 CET50413445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.538151026 CET50413445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.538489103 CET50414445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.543471098 CET445504143.107.178.2192.168.2.6
                                  Jan 14, 2025 21:11:14.543576956 CET50414445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.543576956 CET50414445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.543615103 CET445504133.107.178.2192.168.2.6
                                  Jan 14, 2025 21:11:14.543672085 CET50413445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:14.548504114 CET445504143.107.178.2192.168.2.6
                                  Jan 14, 2025 21:11:15.298499107 CET50424445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:15.303796053 CET44550424191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:11:15.303920984 CET50424445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:15.304184914 CET50424445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:15.309189081 CET44550424191.205.25.1192.168.2.6
                                  Jan 14, 2025 21:11:15.892468929 CET4455028369.97.150.1192.168.2.6
                                  Jan 14, 2025 21:11:15.892534018 CET50283445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:15.892577887 CET50283445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:15.892611980 CET50283445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:15.897535086 CET4455028369.97.150.1192.168.2.6
                                  Jan 14, 2025 21:11:15.897572041 CET4455028369.97.150.1192.168.2.6
                                  Jan 14, 2025 21:11:16.481342077 CET4455028724.92.19.1192.168.2.6
                                  Jan 14, 2025 21:11:16.481616020 CET50287445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:11:16.481705904 CET50287445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:11:16.481705904 CET50287445192.168.2.624.92.19.1
                                  Jan 14, 2025 21:11:16.486707926 CET4455028724.92.19.1192.168.2.6
                                  Jan 14, 2025 21:11:16.486742020 CET4455028724.92.19.1192.168.2.6
                                  Jan 14, 2025 21:11:16.533067942 CET50446445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:16.538306952 CET4455044624.92.19.2192.168.2.6
                                  Jan 14, 2025 21:11:16.538429976 CET50446445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:16.538533926 CET50446445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:16.538940907 CET50447445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:16.543507099 CET4455044624.92.19.2192.168.2.6
                                  Jan 14, 2025 21:11:16.543625116 CET50446445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:16.543807030 CET4455044724.92.19.2192.168.2.6
                                  Jan 14, 2025 21:11:16.543950081 CET50447445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:16.548799038 CET4455044724.92.19.2192.168.2.6
                                  Jan 14, 2025 21:11:17.142431021 CET50463445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:17.147541046 CET44550463217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:11:17.147664070 CET50463445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:17.147690058 CET50463445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:17.152569056 CET44550463217.202.110.1192.168.2.6
                                  Jan 14, 2025 21:11:17.500448942 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:17.500485897 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:17.500554085 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:17.501101971 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:17.501116991 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:17.528033972 CET445502988.157.50.1192.168.2.6
                                  Jan 14, 2025 21:11:17.528167009 CET50298445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:11:17.528167009 CET50298445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:11:17.528167009 CET50298445192.168.2.68.157.50.1
                                  Jan 14, 2025 21:11:17.533634901 CET445502988.157.50.1192.168.2.6
                                  Jan 14, 2025 21:11:17.533679008 CET445502988.157.50.1192.168.2.6
                                  Jan 14, 2025 21:11:18.311117887 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.311358929 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.313024044 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.313038111 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.313390017 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.315260887 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.315321922 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.315327883 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.315431118 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.359333038 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.495102882 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.495214939 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.495273113 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.495393991 CET50470443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:18.495414972 CET4435047040.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:18.511133909 CET44550306122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:11:18.511298895 CET50306445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:11:18.511300087 CET50306445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:11:18.511425018 CET50306445192.168.2.6122.76.227.1
                                  Jan 14, 2025 21:11:18.516336918 CET44550306122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:11:18.516366959 CET44550306122.76.227.1192.168.2.6
                                  Jan 14, 2025 21:11:18.564400911 CET50506445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.569576025 CET44550506122.76.227.2192.168.2.6
                                  Jan 14, 2025 21:11:18.569711924 CET50506445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.570075989 CET50506445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.570116997 CET50507445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.575086117 CET44550506122.76.227.2192.168.2.6
                                  Jan 14, 2025 21:11:18.575119972 CET44550507122.76.227.2192.168.2.6
                                  Jan 14, 2025 21:11:18.575175047 CET50506445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.575342894 CET50507445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.575342894 CET50507445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:18.580245972 CET44550507122.76.227.2192.168.2.6
                                  Jan 14, 2025 21:11:18.908068895 CET50524445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:18.913341999 CET4455052469.97.150.1192.168.2.6
                                  Jan 14, 2025 21:11:18.913613081 CET50524445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:18.913614035 CET50524445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:18.918593884 CET4455052469.97.150.1192.168.2.6
                                  Jan 14, 2025 21:11:19.062684059 CET4455031134.177.88.1192.168.2.6
                                  Jan 14, 2025 21:11:19.062908888 CET50311445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:11:19.062908888 CET50311445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:11:19.062908888 CET50311445192.168.2.634.177.88.1
                                  Jan 14, 2025 21:11:19.068130970 CET4455031134.177.88.1192.168.2.6
                                  Jan 14, 2025 21:11:19.068145037 CET4455031134.177.88.1192.168.2.6
                                  Jan 14, 2025 21:11:20.480562925 CET44550322174.157.161.1192.168.2.6
                                  Jan 14, 2025 21:11:20.480639935 CET50322445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:11:20.511735916 CET44550324201.2.58.1192.168.2.6
                                  Jan 14, 2025 21:11:20.511787891 CET50324445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:11:21.580456018 CET50414445192.168.2.63.107.178.2
                                  Jan 14, 2025 21:11:21.580482006 CET50345445192.168.2.6201.76.167.2
                                  Jan 14, 2025 21:11:21.580518961 CET50331445192.168.2.6157.36.41.1
                                  Jan 14, 2025 21:11:21.580526114 CET50376445192.168.2.686.146.125.2
                                  Jan 14, 2025 21:11:21.580526114 CET50344445192.168.2.658.86.16.2
                                  Jan 14, 2025 21:11:21.580554008 CET50369445192.168.2.6209.29.139.2
                                  Jan 14, 2025 21:11:21.580600977 CET50355445192.168.2.6180.95.118.2
                                  Jan 14, 2025 21:11:21.580693960 CET50322445192.168.2.6174.157.161.1
                                  Jan 14, 2025 21:11:21.580728054 CET50324445192.168.2.6201.2.58.1
                                  Jan 14, 2025 21:11:21.580740929 CET50334445192.168.2.699.232.175.1
                                  Jan 14, 2025 21:11:21.580797911 CET50339445192.168.2.6161.197.61.1
                                  Jan 14, 2025 21:11:21.580816984 CET50338445192.168.2.6223.113.3.1
                                  Jan 14, 2025 21:11:21.580859900 CET50348445192.168.2.680.251.87.1
                                  Jan 14, 2025 21:11:21.580878973 CET50350445192.168.2.6119.177.148.1
                                  Jan 14, 2025 21:11:21.580883980 CET50342445192.168.2.643.112.215.1
                                  Jan 14, 2025 21:11:21.580900908 CET50353445192.168.2.6205.115.6.1
                                  Jan 14, 2025 21:11:21.580919027 CET50358445192.168.2.6101.240.13.1
                                  Jan 14, 2025 21:11:21.580943108 CET50447445192.168.2.624.92.19.2
                                  Jan 14, 2025 21:11:21.580970049 CET50371445192.168.2.6157.41.84.1
                                  Jan 14, 2025 21:11:21.580988884 CET50361445192.168.2.6124.104.82.1
                                  Jan 14, 2025 21:11:21.581015110 CET50364445192.168.2.6112.117.58.1
                                  Jan 14, 2025 21:11:21.581037998 CET50367445192.168.2.678.71.117.1
                                  Jan 14, 2025 21:11:21.581067085 CET50379445192.168.2.617.184.225.1
                                  Jan 14, 2025 21:11:21.581091881 CET50389445192.168.2.6117.201.167.2
                                  Jan 14, 2025 21:11:21.581113100 CET50424445192.168.2.6191.205.25.1
                                  Jan 14, 2025 21:11:21.581140041 CET50397445192.168.2.6169.16.157.1
                                  Jan 14, 2025 21:11:21.581214905 CET50405445192.168.2.6179.57.103.3
                                  Jan 14, 2025 21:11:21.581331015 CET50463445192.168.2.6217.202.110.1
                                  Jan 14, 2025 21:11:21.581413031 CET50524445192.168.2.669.97.150.1
                                  Jan 14, 2025 21:11:21.582387924 CET50507445192.168.2.6122.76.227.2
                                  Jan 14, 2025 21:11:44.783003092 CET49703443192.168.2.620.190.159.71
                                  Jan 14, 2025 21:11:44.789629936 CET4434970320.190.159.71192.168.2.6
                                  Jan 14, 2025 21:11:44.789679050 CET49703443192.168.2.620.190.159.71
                                  Jan 14, 2025 21:11:44.978192091 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:44.978250027 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:44.978312969 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:44.978897095 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:44.978909969 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:45.794219017 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:45.794431925 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:45.796361923 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:45.796370029 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:45.797127962 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:45.799036026 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:45.799102068 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:45.799117088 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:45.799242973 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:45.843341112 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:46.005743980 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:46.005846024 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:46.005884886 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:46.006059885 CET50631443192.168.2.640.113.103.199
                                  Jan 14, 2025 21:11:46.006072998 CET4435063140.113.103.199192.168.2.6
                                  Jan 14, 2025 21:11:47.126945019 CET49707443192.168.2.620.190.159.71
                                  Jan 14, 2025 21:11:47.131988049 CET4434970720.190.159.71192.168.2.6
                                  Jan 14, 2025 21:11:47.132044077 CET49707443192.168.2.620.190.159.71
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 14, 2025 21:10:13.623857021 CET5125453192.168.2.61.1.1.1
                                  Jan 14, 2025 21:10:13.927288055 CET53512541.1.1.1192.168.2.6
                                  Jan 14, 2025 21:10:14.570199013 CET5203253192.168.2.61.1.1.1
                                  Jan 14, 2025 21:10:14.751977921 CET53520321.1.1.1192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 14, 2025 21:10:13.623857021 CET192.168.2.61.1.1.10xd34cStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                  Jan 14, 2025 21:10:14.570199013 CET192.168.2.61.1.1.10x7afcStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 14, 2025 21:10:13.927288055 CET1.1.1.1192.168.2.60xd34cNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                  Jan 14, 2025 21:10:14.751977921 CET1.1.1.1192.168.2.60x7afcNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                  Jan 14, 2025 21:10:14.751977921 CET1.1.1.1192.168.2.60x7afcNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                  • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.649710103.224.212.215806772C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 21:10:13.948256016 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Cache-Control: no-cache
                                  Jan 14, 2025 21:10:14.541198969 CET365INHTTP/1.1 302 Found
                                  date: Tue, 14 Jan 2025 20:10:14 GMT
                                  server: Apache
                                  set-cookie: __tad=1736885414.2680868; expires=Fri, 12-Jan-2035 20:10:14 GMT; Max-Age=315360000
                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-142d-9b39-6bada5abe8f0
                                  content-length: 2
                                  content-type: text/html; charset=UTF-8
                                  connection: close
                                  Data Raw: 0a 0a
                                  Data Ascii:


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.649711199.59.243.228806772C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 21:10:14.764482021 CET169OUTGET /?subid1=20250115-0710-142d-9b39-6bada5abe8f0 HTTP/1.1
                                  Cache-Control: no-cache
                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Connection: Keep-Alive
                                  Jan 14, 2025 21:10:15.217813015 CET1236INHTTP/1.1 200 OK
                                  date: Tue, 14 Jan 2025 20:10:14 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1262
                                  x-request-id: 1540a814-dc09-4b25-9fe0-996b538985e8
                                  cache-control: no-store, max-age=0
                                  accept-ch: sec-ch-prefers-color-scheme
                                  critical-ch: sec-ch-prefers-color-scheme
                                  vary: sec-ch-prefers-color-scheme
                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Gcm+JAgOLyhoxC8H19werlO4BvzaAuNvmFQUsGqCVtg8Y6eETjEfW7/fJrT8QbFqK8namPIAdBF6TfnSAJChrQ==
                                  set-cookie: parking_session=1540a814-dc09-4b25-9fe0-996b538985e8; expires=Tue, 14 Jan 2025 20:25:15 GMT; path=/
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 47 63 6d 2b 4a 41 67 4f 4c 79 68 6f 78 43 38 48 31 39 77 65 72 6c 4f 34 42 76 7a 61 41 75 4e 76 6d 46 51 55 73 47 71 43 56 74 67 38 59 36 65 45 54 6a 45 66 57 37 2f 66 4a 72 54 38 51 62 46 71 4b 38 6e 61 6d 50 49 41 64 42 46 36 54 66 6e 53 41 4a 43 68 72 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Gcm+JAgOLyhoxC8H19werlO4BvzaAuNvmFQUsGqCVtg8Y6eETjEfW7/fJrT8QbFqK8namPIAdBF6TfnSAJChrQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                  Jan 14, 2025 21:10:15.217858076 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                  Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMTU0MGE4MTQtZGMwOS00YjI1LTlmZTAtOTk2YjUzODk4NWU4IiwicGFnZV90aW1lIjoxNzM2ODg1NDE1LCJwYWdlX3VybCI6I


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.649713103.224.212.215802052C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 21:10:15.442264080 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Cache-Control: no-cache
                                  Jan 14, 2025 21:10:16.045011997 CET365INHTTP/1.1 302 Found
                                  date: Tue, 14 Jan 2025 20:10:15 GMT
                                  server: Apache
                                  set-cookie: __tad=1736885415.4477357; expires=Fri, 12-Jan-2035 20:10:15 GMT; Max-Age=315360000
                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4
                                  content-length: 2
                                  content-type: text/html; charset=UTF-8
                                  connection: close
                                  Data Raw: 0a 0a
                                  Data Ascii:


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.649714199.59.243.228802052C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 21:10:16.076160908 CET169OUTGET /?subid1=20250115-0710-15b5-ac8d-d0af4adebdd4 HTTP/1.1
                                  Cache-Control: no-cache
                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Connection: Keep-Alive
                                  Jan 14, 2025 21:10:16.562834024 CET1236INHTTP/1.1 200 OK
                                  date: Tue, 14 Jan 2025 20:10:15 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1262
                                  x-request-id: 9636b5f5-f873-43d2-ad33-9c38fe3fa6f6
                                  cache-control: no-store, max-age=0
                                  accept-ch: sec-ch-prefers-color-scheme
                                  critical-ch: sec-ch-prefers-color-scheme
                                  vary: sec-ch-prefers-color-scheme
                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_MML3QP3LOoWlhit77csZrW5GreKm9QoeKDWgJdUDf5aOvv4/uHph7SwcGmTGJLA6elm1M9M/f8grVdATxoqX8w==
                                  set-cookie: parking_session=9636b5f5-f873-43d2-ad33-9c38fe3fa6f6; expires=Tue, 14 Jan 2025 20:25:16 GMT; path=/
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4d 4d 4c 33 51 50 33 4c 4f 6f 57 6c 68 69 74 37 37 63 73 5a 72 57 35 47 72 65 4b 6d 39 51 6f 65 4b 44 57 67 4a 64 55 44 66 35 61 4f 76 76 34 2f 75 48 70 68 37 53 77 63 47 6d 54 47 4a 4c 41 36 65 6c 6d 31 4d 39 4d 2f 66 38 67 72 56 64 41 54 78 6f 71 58 38 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_MML3QP3LOoWlhit77csZrW5GreKm9QoeKDWgJdUDf5aOvv4/uHph7SwcGmTGJLA6elm1M9M/f8grVdATxoqX8w==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                  Jan 14, 2025 21:10:16.562855959 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                  Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiOTYzNmI1ZjUtZjg3My00M2QyLWFkMzMtOWMzOGZlM2ZhNmY2IiwicGFnZV90aW1lIjoxNzM2ODg1NDE2LCJwYWdlX3VybCI6I


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.649715103.224.212.215806060C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 21:10:16.081079006 CET134OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Cache-Control: no-cache
                                  Cookie: __tad=1736885414.2680868
                                  Jan 14, 2025 21:10:16.702507019 CET269INHTTP/1.1 302 Found
                                  date: Tue, 14 Jan 2025 20:10:16 GMT
                                  server: Apache
                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0710-16e0-bd1a-f1b048c043c7
                                  content-length: 2
                                  content-type: text/html; charset=UTF-8
                                  connection: close
                                  Data Raw: 0a 0a
                                  Data Ascii:


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.649726199.59.243.228806060C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 21:10:16.712132931 CET231OUTGET /?subid1=20250115-0710-16e0-bd1a-f1b048c043c7 HTTP/1.1
                                  Cache-Control: no-cache
                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Connection: Keep-Alive
                                  Cookie: parking_session=1540a814-dc09-4b25-9fe0-996b538985e8
                                  Jan 14, 2025 21:10:17.175723076 CET1236INHTTP/1.1 200 OK
                                  date: Tue, 14 Jan 2025 20:10:16 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1262
                                  x-request-id: 699cc23a-8b69-4ca0-9ebf-da51de6942e3
                                  cache-control: no-store, max-age=0
                                  accept-ch: sec-ch-prefers-color-scheme
                                  critical-ch: sec-ch-prefers-color-scheme
                                  vary: sec-ch-prefers-color-scheme
                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Aj4t7mB8pQAuEQ01Z8GlRPW+NgLra9YbXvgyIgKU1QdR1pAS4GawlkCdGFksk78oSo/LpSYQF0qTRzyTB/cgTQ==
                                  set-cookie: parking_session=1540a814-dc09-4b25-9fe0-996b538985e8; expires=Tue, 14 Jan 2025 20:25:17 GMT
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 41 6a 34 74 37 6d 42 38 70 51 41 75 45 51 30 31 5a 38 47 6c 52 50 57 2b 4e 67 4c 72 61 39 59 62 58 76 67 79 49 67 4b 55 31 51 64 52 31 70 41 53 34 47 61 77 6c 6b 43 64 47 46 6b 73 6b 37 38 6f 53 6f 2f 4c 70 53 59 51 46 30 71 54 52 7a 79 54 42 2f 63 67 54 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Aj4t7mB8pQAuEQ01Z8GlRPW+NgLra9YbXvgyIgKU1QdR1pAS4GawlkCdGFksk78oSo/LpSYQF0qTRzyTB/cgTQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                  Jan 14, 2025 21:10:17.175760031 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                  Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMTU0MGE4MTQtZGMwOS00YjI1LTlmZTAtOTk2YjUzODk4NWU4IiwicGFnZV90aW1lIjoxNzM2ODg1NDE3LCJwYWdlX3VybCI6Imh0dHA6L


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  0192.168.2.64970940.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2025-01-14 20:10:12 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 2f 61 71 78 36 6e 43 73 39 45 2b 53 56 67 64 54 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 66 30 61 33 62 39 64 32 39 33 65 36 36 34 63 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: /aqx6nCs9E+SVgdT.1Context: af0a3b9d293e664c
                                  2025-01-14 20:10:12 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-14 20:10:12 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 2f 61 71 78 36 6e 43 73 39 45 2b 53 56 67 64 54 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 66 30 61 33 62 39 64 32 39 33 65 36 36 34 63 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: /aqx6nCs9E+SVgdT.2Context: af0a3b9d293e664c<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                  2025-01-14 20:10:12 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 2f 61 71 78 36 6e 43 73 39 45 2b 53 56 67 64 54 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 66 30 61 33 62 39 64 32 39 33 65 36 36 34 63 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: /aqx6nCs9E+SVgdT.3Context: af0a3b9d293e664c<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-14 20:10:12 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-14 20:10:12 UTC58INData Raw: 4d 53 2d 43 56 3a 20 54 5a 4d 68 70 41 63 7a 62 30 53 57 46 59 57 66 73 58 47 6c 6f 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: TZMhpAczb0SWFYWfsXGlow.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  1192.168.2.64978440.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2025-01-14 20:10:20 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4b 72 2f 35 58 38 46 69 71 45 53 37 58 30 33 4d 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 32 61 38 31 31 36 32 39 32 36 36 32 61 30 62 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: Kr/5X8FiqES7X03M.1Context: c2a8116292662a0b
                                  2025-01-14 20:10:20 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-14 20:10:20 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4b 72 2f 35 58 38 46 69 71 45 53 37 58 30 33 4d 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 32 61 38 31 31 36 32 39 32 36 36 32 61 30 62 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: Kr/5X8FiqES7X03M.2Context: c2a8116292662a0b<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                  2025-01-14 20:10:20 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4b 72 2f 35 58 38 46 69 71 45 53 37 58 30 33 4d 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 32 61 38 31 31 36 32 39 32 36 36 32 61 30 62 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: Kr/5X8FiqES7X03M.3Context: c2a8116292662a0b<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-14 20:10:21 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-14 20:10:21 UTC58INData Raw: 4d 53 2d 43 56 3a 20 5a 6e 6d 78 78 70 59 75 46 6b 43 76 4e 43 2b 4d 54 4a 6d 4e 41 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: ZnmxxpYuFkCvNC+MTJmNAA.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  2192.168.2.65000940.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2025-01-14 20:10:33 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 46 4d 56 4c 33 6a 65 58 42 45 43 38 71 6b 67 67 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 62 30 30 36 62 61 36 36 64 32 34 38 62 30 33 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: FMVL3jeXBEC8qkgg.1Context: ab006ba66d248b03
                                  2025-01-14 20:10:33 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-14 20:10:33 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 46 4d 56 4c 33 6a 65 58 42 45 43 38 71 6b 67 67 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 62 30 30 36 62 61 36 36 64 32 34 38 62 30 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: FMVL3jeXBEC8qkgg.2Context: ab006ba66d248b03<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                  2025-01-14 20:10:33 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 46 4d 56 4c 33 6a 65 58 42 45 43 38 71 6b 67 67 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 62 30 30 36 62 61 36 36 64 32 34 38 62 30 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: FMVL3jeXBEC8qkgg.3Context: ab006ba66d248b03<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-14 20:10:33 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-14 20:10:33 UTC58INData Raw: 4d 53 2d 43 56 3a 20 66 34 37 6d 74 48 34 42 73 45 4f 6a 52 4f 54 70 61 43 30 7a 47 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: f47mtH4BsEOjROTpaC0zGQ.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  3192.168.2.65025940.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2025-01-14 20:10:52 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4d 77 52 35 45 79 45 35 42 55 75 39 36 68 6d 67 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 31 39 34 39 30 65 65 30 36 35 35 36 62 37 35 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: MwR5EyE5BUu96hmg.1Context: c19490ee06556b75
                                  2025-01-14 20:10:52 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-14 20:10:52 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4d 77 52 35 45 79 45 35 42 55 75 39 36 68 6d 67 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 31 39 34 39 30 65 65 30 36 35 35 36 62 37 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: MwR5EyE5BUu96hmg.2Context: c19490ee06556b75<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                  2025-01-14 20:10:52 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4d 77 52 35 45 79 45 35 42 55 75 39 36 68 6d 67 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 31 39 34 39 30 65 65 30 36 35 35 36 62 37 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: MwR5EyE5BUu96hmg.3Context: c19490ee06556b75<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-14 20:10:52 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-14 20:10:52 UTC58INData Raw: 4d 53 2d 43 56 3a 20 59 30 4f 73 52 64 34 6f 2f 6b 57 58 67 58 56 39 59 45 56 54 61 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: Y0OsRd4o/kWXgXV9YEVTag.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  4192.168.2.65047040.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2025-01-14 20:11:18 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 31 56 45 66 41 31 77 76 4f 6b 79 6a 2b 42 59 4f 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 30 36 39 37 30 36 38 31 31 34 33 65 30 35 65 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: 1VEfA1wvOkyj+BYO.1Context: d06970681143e05e
                                  2025-01-14 20:11:18 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-14 20:11:18 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 31 56 45 66 41 31 77 76 4f 6b 79 6a 2b 42 59 4f 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 30 36 39 37 30 36 38 31 31 34 33 65 30 35 65 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 1VEfA1wvOkyj+BYO.2Context: d06970681143e05e<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                  2025-01-14 20:11:18 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 31 56 45 66 41 31 77 76 4f 6b 79 6a 2b 42 59 4f 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 30 36 39 37 30 36 38 31 31 34 33 65 30 35 65 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: 1VEfA1wvOkyj+BYO.3Context: d06970681143e05e<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-14 20:11:18 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-14 20:11:18 UTC58INData Raw: 4d 53 2d 43 56 3a 20 66 4c 39 4d 30 34 66 55 7a 6b 4f 49 4e 32 45 71 73 68 74 51 4f 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: fL9M04fUzkOIN2EqshtQOA.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  5192.168.2.65063140.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2025-01-14 20:11:45 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 59 41 46 68 32 7a 30 53 53 30 2b 55 7a 55 36 62 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 66 31 65 39 66 35 62 64 66 33 65 37 33 33 36 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: YAFh2z0SS0+UzU6b.1Context: 2f1e9f5bdf3e7336
                                  2025-01-14 20:11:45 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2025-01-14 20:11:45 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 59 41 46 68 32 7a 30 53 53 30 2b 55 7a 55 36 62 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 66 31 65 39 66 35 62 64 66 33 65 37 33 33 36 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: YAFh2z0SS0+UzU6b.2Context: 2f1e9f5bdf3e7336<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                  2025-01-14 20:11:45 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 59 41 46 68 32 7a 30 53 53 30 2b 55 7a 55 36 62 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 66 31 65 39 66 35 62 64 66 33 65 37 33 33 36 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: YAFh2z0SS0+UzU6b.3Context: 2f1e9f5bdf3e7336<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2025-01-14 20:11:45 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2025-01-14 20:11:45 UTC58INData Raw: 4d 53 2d 43 56 3a 20 76 32 74 55 34 39 62 4d 5a 55 4f 53 39 76 4c 6e 4d 58 41 58 69 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: v2tU49bMZUOS9vLnMXAXig.0Payload parsing failed.


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:15:10:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll"
                                  Imagebase:0xca0000
                                  File size:126'464 bytes
                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:1
                                  Start time:15:10:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff66e660000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:15:10:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1
                                  Imagebase:0x1c0000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:15:10:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\m9oUIFauYl.dll,PlayGame
                                  Imagebase:0xd00000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:15:10:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",#1
                                  Imagebase:0xd00000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:15:10:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvr.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvr.exe
                                  Imagebase:0x400000
                                  File size:2'281'472 bytes
                                  MD5 hash:1AA4152354EE92FDB2C8E1F11381A8E5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2166045761.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2166194262.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2166194262.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:15:10:14
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvr.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                  Imagebase:0x400000
                                  File size:2'281'472 bytes
                                  MD5 hash:1AA4152354EE92FDB2C8E1F11381A8E5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2188213919.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2188355159.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2188355159.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2838123149.0000000001D5F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2838123149.0000000001D5F000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2838357581.0000000002287000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2838357581.0000000002287000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:15:10:15
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\m9oUIFauYl.dll",PlayGame
                                  Imagebase:0xd00000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:10
                                  Start time:15:10:15
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvr.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvr.exe
                                  Imagebase:0x400000
                                  File size:2'281'472 bytes
                                  MD5 hash:1AA4152354EE92FDB2C8E1F11381A8E5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2194580978.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2194747129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2194747129.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2209893875.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2210111513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2210111513.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:71.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:63.2%
                                    Total number of Nodes:38
                                    Total number of Limit Nodes:9
                                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F7F0EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                    • CreateProcessA.KERNELBASE ref: 00407EE8
                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2202101856.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2202074214.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202129080.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202239373.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4281112323-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2202101856.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2202074214.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202129080.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202239373.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2202101856.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2202074214.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202129080.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202239373.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    • API String ID: 774561529-2614457033
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F7F0EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2202101856.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2202074214.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202129080.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202239373.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                    • API String ID: 3340711343-2450984573
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F7F0EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2202101856.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2202074214.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202129080.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202171061.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202239373.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2202332421.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.1
                                    • API String ID: 4274534310-2839763450
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Execution Graph

                                    Execution Coverage:34.8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:36
                                    Total number of Limit Nodes:2

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F7F0EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2836911392.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2836895995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836928266.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837002846.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837018578.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.1
                                    • API String ID: 4274534310-2839763450
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2836911392.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2836895995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836928266.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837002846.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837018578.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    • API String ID: 774561529-2614457033
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F7F0EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2836911392.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2836895995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836928266.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837002846.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837018578.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                    • API String ID: 3340711343-2450984573
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F7F0EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2836911392.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2836895995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836928266.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837002846.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837018578.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4072214828-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2836911392.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000008.00000002.2836895995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836928266.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836945707.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2836987681.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837002846.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837018578.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000008.00000002.2837131495.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59