Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eIZi481eP6.dll

Overview

General Information

Sample name:eIZi481eP6.dll
renamed because original name is a hash value
Original sample name:7d7bf2240e76f419611094080e31948b.dll
Analysis ID:1591284
MD5:7d7bf2240e76f419611094080e31948b
SHA1:471955bc47b05691cb6e4d745b08ca6f5de3d335
SHA256:9b1ba31dfc982db0bad465668a06e241534ddb379d4ee3cf33946b29cddd994c
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7948 cmdline: loaddll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 8000 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 8024 cmdline: rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8008 cmdline: rundll32.exe C:\Users\user\Desktop\eIZi481eP6.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 8088 cmdline: C:\WINDOWS\mssecsvr.exe MD5: E5CFF35706AB7BDAFA5F00F6FAD7058D)
    • rundll32.exe (PID: 7260 cmdline: rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 7336 cmdline: C:\WINDOWS\mssecsvr.exe MD5: E5CFF35706AB7BDAFA5F00F6FAD7058D)
  • mssecsvr.exe (PID: 7188 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: E5CFF35706AB7BDAFA5F00F6FAD7058D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
eIZi481eP6.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    eIZi481eP6.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    • 0x38b0a:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    • 0x387e4:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
    • 0x383d0:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
    eIZi481eP6.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\mssecsvr.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\mssecsvr.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0x3136c:$x3: tasksche.exe
      • 0x4157c:$x3: tasksche.exe
      • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0x415d0:$x5: WNcry@2ol7
      • 0x31344:$x8: C:\%s\qeriuwjhrf
      • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xe034:$s1: C:\%s\%s
      • 0x17338:$s1: C:\%s\%s
      • 0x31358:$s1: C:\%s\%s
      • 0x414d0:$s3: cmd.exe /c "%s"
      • 0x73a24:$s4: msg/m_portuguese.wnry
      • 0x2e68c:$s5: \\192.168.56.20\IPC$
      • 0x1ba81:$s6: \\172.16.99.5\IPC$
      • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
      • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
      • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
      • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x34780:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x3436c:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\mssecsvr.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
      • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
      • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
      • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
      • 0x1d439:$s1: __TREEID__PLACEHOLDER__
      • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
      • 0x1f508:$s1: __TREEID__PLACEHOLDER__
      • 0x20570:$s1: __TREEID__PLACEHOLDER__
      • 0x215d8:$s1: __TREEID__PLACEHOLDER__
      • 0x22640:$s1: __TREEID__PLACEHOLDER__
      • 0x236a8:$s1: __TREEID__PLACEHOLDER__
      • 0x24710:$s1: __TREEID__PLACEHOLDER__
      • 0x25778:$s1: __TREEID__PLACEHOLDER__
      • 0x267e0:$s1: __TREEID__PLACEHOLDER__
      • 0x27848:$s1: __TREEID__PLACEHOLDER__
      • 0x288b0:$s1: __TREEID__PLACEHOLDER__
      • 0x29918:$s1: __TREEID__PLACEHOLDER__
      • 0x2a980:$s1: __TREEID__PLACEHOLDER__
      • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
      • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e340:$s1: __TREEID__PLACEHOLDER__
      C:\Windows\mssecsvr.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvr.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
      • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
      • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000002.1417194747.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000008.00000000.1400887390.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvr.exe.22718c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvr.exe.1d4d084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.0.mssecsvr.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                8.0.mssecsvr.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                8.0.mssecsvr.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 117 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:36.688859+010028033043Unknown Traffic192.168.2.949750103.224.212.21580TCP
                2025-01-14T21:11:38.632358+010028033043Unknown Traffic192.168.2.949763103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:11:35.762015+010028300181A Network Trojan was detected192.168.2.9634231.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: eIZi481eP6.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985ddAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051bdAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/eAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879f0Avira URL Cloud: Label: malware
                Source: C:\Windows\mssecsvr.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\mssecsvr.exeReversingLabs: Detection: 96%
                Source: eIZi481eP6.dllVirustotal: Detection: 93%Perma Link
                Source: eIZi481eP6.dllReversingLabs: Detection: 92%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: C:\Windows\mssecsvr.exeJoe Sandbox ML: detected
                Source: eIZi481eP6.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: eIZi481eP6.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownHTTPS traffic detected: 23.206.229.209:443 -> 192.168.2.9:49959 version: TLS 1.0

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.9:63423 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0711-3621-b2b0-8d3080c051bd HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736885496.8445919
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0711-38c6-8000-741dcdd985dd HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0711-3814-92f5-579ab78879f0 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=7ae06bd6-da66-45e5-bf42-511b3c3bec92
                Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49763 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49750 -> 103.224.212.215:80
                Source: unknownHTTPS traffic detected: 23.206.229.209:443 -> 192.168.2.9:49959 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.18
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.18
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.18
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.18
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 174.249.30.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.14
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.14
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.14
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.14
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 180.146.240.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.70
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.70
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.70
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.70
                Source: unknownTCP traffic detected without corresponding DNS query: 189.221.206.1
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 153.157.148.172
                Source: unknownTCP traffic detected without corresponding DNS query: 153.157.148.172
                Source: unknownTCP traffic detected without corresponding DNS query: 153.157.148.172
                Source: unknownTCP traffic detected without corresponding DNS query: 153.157.148.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.157.148.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.157.148.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0711-3621-b2b0-8d3080c051bd HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736885496.8445919
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0711-38c6-8000-741dcdd985dd HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0711-3814-92f5-579ab78879f0 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=7ae06bd6-da66-45e5-bf42-511b3c3bec92
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B59000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1416685771.0000000000B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051
                Source: mssecsvr.exe, 0000000A.00000002.1417650449.0000000000BCC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000BEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879
                Source: mssecsvr.exe, 00000008.00000002.2052889581.000000000097B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985
                Source: mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/e
                Source: mssecsvr.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000AFE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1416685771.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000BCC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B59000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&
                Source: mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com//
                Source: mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/F6
                Source: mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/U
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/_
                Source: mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/u
                Source: mssecsvr.exe, 00000008.00000002.2052430296.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comM
                Source: mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comgs
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comm6
                Source: mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comw
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49959 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: eIZi481eP6.dll, type: SAMPLE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22718c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d4d084.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2280948.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5c104.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.227c8e8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d580a4.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1417194747.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1400887390.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1374634946.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1417356799.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.1403754476.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.1403921673.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1401014694.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2053697443.0000000002280000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2053408103.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 8088, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7188, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7336, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\mssecsvr.exe, type: DROPPED

                System Summary

                barindex
                Source: eIZi481eP6.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: eIZi481eP6.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22718c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d4d084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22718c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22718c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1d4d084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d4d084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.2280948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2280948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d5c104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d5c104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.227c8e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.227c8e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d580a4.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d580a4.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000002.1417356799.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000000.1403921673.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1401014694.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2053697443.0000000002280000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2053408103.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: mssecsvr.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: eIZi481eP6.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: eIZi481eP6.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: eIZi481eP6.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22718c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d4d084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d7f128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1d5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.2280948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22718c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22718c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1d4d084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d4d084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22a396c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d7f128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22a396c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.2280948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2280948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d5c104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d5c104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.227c8e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.227c8e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d580a4.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d580a4.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000002.1417356799.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000000.1403921673.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1401014694.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2053697443.0000000002280000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2053408103.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: eIZi481eP6.dll, mssecsvr.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7956:120:WilError_03
                Source: eIZi481eP6.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\eIZi481eP6.dll,PlayGame
                Source: eIZi481eP6.dllVirustotal: Detection: 93%
                Source: eIZi481eP6.dllReversingLabs: Detection: 92%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\eIZi481eP6.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\eIZi481eP6.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: eIZi481eP6.dllStatic file information: File size 5267459 > 1048576
                Source: eIZi481eP6.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7572Thread sleep count: 93 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7572Thread sleep time: -186000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7576Thread sleep count: 131 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7576Thread sleep count: 39 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7572Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: Amcache.hve.6.drBinary or memory string: VMware
                Source: mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpr
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B64000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.1415718996.000000000099C000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2052889581.000000000099C000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000BEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: mssecsvr.exe, 00000006.00000002.1416685771.0000000000B25000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8c
                Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
                Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1Jump to behavior
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Rundll32
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591284 Sample: eIZi481eP6.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 33 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->33 35 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->35 37 77026.bodis.com 2->37 47 Suricata IDS alerts for network traffic 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 Antivirus detection for URL or domain 2->51 53 5 other signatures 2->53 8 loaddll32.exe 1 2->8         started        10 mssecsvr.exe 12 2->10         started        signatures3 process4 dnsIp5 14 rundll32.exe 8->14         started        16 rundll32.exe 8->16         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        39 192.168.2.102 unknown unknown 10->39 41 192.168.2.103 unknown unknown 10->41 43 98 other IPs or domains 10->43 61 Connects to many different private IPs via SMB (likely to spread or exploit) 10->61 63 Connects to many different private IPs (likely to spread or exploit) 10->63 signatures6 process7 signatures8 23 mssecsvr.exe 13 14->23         started        45 Drops executables to the windows directory (C:\Windows) and starts them 16->45 26 mssecsvr.exe 13 16->26         started        28 rundll32.exe 1 19->28         started        process9 file10 55 Antivirus detection for dropped file 23->55 57 Multi AV Scanner detection for dropped file 23->57 59 Machine Learning detection for dropped file 23->59 31 C:\Windows\mssecsvr.exe, PE32 28->31 dropped signatures11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                eIZi481eP6.dll93%VirustotalBrowse
                eIZi481eP6.dll92%ReversingLabsWin32.Ransomware.WannaCry
                eIZi481eP6.dll100%AviraTR/Ransom.Gen
                eIZi481eP6.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\mssecsvr.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvr.exe100%Joe Sandbox ML
                C:\Windows\mssecsvr.exe97%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comM0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comw0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985dd100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051bd100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comgs0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/e100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comm60%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879f0100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    103.224.212.215
                    truefalse
                      high
                      ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051bdfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985ddfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                          high
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879f0false
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com//mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879mssecsvr.exe, 0000000A.00000002.1417650449.0000000000BCC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000BEB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comwmssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&mssecsvr.exe, 00000006.00000002.1416685771.0000000000B59000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1417650449.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.1416685771.0000000000B59000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051mssecsvr.exe, 00000006.00000002.1416685771.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1416685771.0000000000B64000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.commssecsvr.exe.4.drfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comMmssecsvr.exe, 00000006.00000002.1416685771.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/_mssecsvr.exe, 00000006.00000002.1416685771.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://upx.sf.netAmcache.hve.6.drfalse
                                    high
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985mssecsvr.exe, 00000008.00000002.2052889581.000000000097B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000008.00000002.2052430296.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comgsmssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comm6mssecsvr.exe, 00000006.00000002.1416685771.0000000000B40000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/emssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Umssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/umssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2mssecsvr.exe, 00000008.00000002.2052889581.0000000000958000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/F6mssecsvr.exe, 00000006.00000002.1416685771.0000000000B40000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            14.83.224.2
                                            unknownKorea Republic of
                                            4766KIXS-AS-KRKoreaTelecomKRfalse
                                            14.83.224.1
                                            unknownKorea Republic of
                                            4766KIXS-AS-KRKoreaTelecomKRfalse
                                            2.65.247.1
                                            unknownSweden
                                            44034HI3GSEfalse
                                            126.247.214.152
                                            unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                            153.157.148.2
                                            unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                            153.157.148.1
                                            unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                            183.48.5.237
                                            unknownChina
                                            4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                            168.102.177.1
                                            unknownUnited States
                                            6461ZAYO-6461USfalse
                                            165.95.110.177
                                            unknownUnited States
                                            1970TAMUS-NETUSfalse
                                            187.16.168.99
                                            unknownBrazil
                                            28256HPEAUTOMOTORESDOBRASILLTDABRfalse
                                            58.51.75.1
                                            unknownChina
                                            4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                            174.249.30.18
                                            unknownUnited States
                                            22394CELLCOUSfalse
                                            1.153.139.2
                                            unknownAustralia
                                            1221ASN-TELSTRATelstraCorporationLtdAUfalse
                                            1.153.139.1
                                            unknownAustralia
                                            1221ASN-TELSTRATelstraCorporationLtdAUfalse
                                            145.91.202.42
                                            unknownNetherlands
                                            1103SURFNET-NLSURFnetTheNetherlandsNLfalse
                                            159.61.241.64
                                            unknownUnited States
                                            2386INS-ASUSfalse
                                            182.119.252.121
                                            unknownChina
                                            4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                            11.220.125.22
                                            unknownUnited States
                                            3356LEVEL3USfalse
                                            180.146.240.14
                                            unknownJapan17511OPTAGEOPTAGEIncJPfalse
                                            160.141.203.86
                                            unknownUnited States
                                            5972DNIC-ASBLK-05800-06055USfalse
                                            7.224.74.160
                                            unknownUnited States
                                            3356LEVEL3USfalse
                                            126.147.175.1
                                            unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                            7.224.74.1
                                            unknownUnited States
                                            3356LEVEL3USfalse
                                            153.157.148.172
                                            unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                            IP
                                            192.168.2.148
                                            192.168.2.149
                                            192.168.2.146
                                            192.168.2.147
                                            192.168.2.140
                                            192.168.2.141
                                            192.168.2.144
                                            192.168.2.145
                                            192.168.2.142
                                            192.168.2.143
                                            192.168.2.159
                                            192.168.2.157
                                            192.168.2.158
                                            192.168.2.151
                                            192.168.2.152
                                            192.168.2.150
                                            192.168.2.155
                                            192.168.2.156
                                            192.168.2.153
                                            192.168.2.154
                                            192.168.2.126
                                            192.168.2.247
                                            192.168.2.127
                                            192.168.2.248
                                            192.168.2.124
                                            192.168.2.245
                                            192.168.2.125
                                            192.168.2.246
                                            192.168.2.128
                                            192.168.2.249
                                            192.168.2.129
                                            192.168.2.240
                                            192.168.2.122
                                            192.168.2.243
                                            192.168.2.123
                                            192.168.2.244
                                            192.168.2.120
                                            192.168.2.241
                                            192.168.2.121
                                            192.168.2.242
                                            192.168.2.97
                                            192.168.2.137
                                            192.168.2.96
                                            192.168.2.138
                                            192.168.2.99
                                            192.168.2.135
                                            192.168.2.98
                                            192.168.2.136
                                            192.168.2.139
                                            192.168.2.250
                                            192.168.2.130
                                            192.168.2.251
                                            192.168.2.91
                                            192.168.2.90
                                            192.168.2.93
                                            192.168.2.133
                                            192.168.2.254
                                            192.168.2.92
                                            192.168.2.134
                                            192.168.2.95
                                            192.168.2.131
                                            192.168.2.252
                                            192.168.2.94
                                            192.168.2.132
                                            192.168.2.253
                                            192.168.2.104
                                            192.168.2.225
                                            192.168.2.105
                                            192.168.2.226
                                            192.168.2.102
                                            192.168.2.223
                                            192.168.2.103
                                            192.168.2.224
                                            192.168.2.108
                                            192.168.2.229
                                            192.168.2.109
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1591284
                                            Start date and time:2025-01-14 21:10:39 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 5m 17s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:15
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:eIZi481eP6.dll
                                            renamed because original name is a hash value
                                            Original Sample Name:7d7bf2240e76f419611094080e31948b.dll
                                            Detection:MAL
                                            Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .dll
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded IPs from analysis (whitelisted): 2.17.190.73, 13.107.246.45, 4.245.163.56
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            15:11:36API Interceptor1x Sleep call for process: loaddll32.exe modified
                                            15:12:12API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            s-part-0017.t-0009.t-msedge.netYx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                            • 13.107.246.45
                                            sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                            • 13.107.246.45
                                            logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                                            • 13.107.246.45
                                            DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 13.107.246.45
                                            Document_31055.pdfGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            87.247.158.212.ps1Get hashmaliciousLummaCBrowse
                                            • 13.107.246.45
                                            77026.bodis.comm9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                            • 199.59.243.227
                                            7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                                            • 199.59.243.227
                                            UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                                            • 199.59.243.227
                                            1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                                            • 199.59.243.227
                                            arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                                            • 199.59.243.227
                                            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comm9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            LisectAVT_2403002A_327.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            yrBA01LVo2.exeGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            lJt3mQqCQl.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.220
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            HI3GSEres.x86.elfGet hashmaliciousUnknownBrowse
                                            • 109.56.192.10
                                            miori.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 109.58.82.107
                                            armv7l.elfGet hashmaliciousUnknownBrowse
                                            • 2.68.124.6
                                            kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                            • 37.250.34.164
                                            botx.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 109.56.155.56
                                            db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                            • 37.250.34.175
                                            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 95.209.80.190
                                            la.bot.mips.elfGet hashmaliciousMiraiBrowse
                                            • 37.250.167.225
                                            sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 2.67.189.204
                                            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 2.67.3.204
                                            KIXS-AS-KRKoreaTelecomKRYx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                            • 14.33.85.1
                                            5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                            • 222.117.242.2
                                            mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                            • 14.86.25.59
                                            meth3.elfGet hashmaliciousMiraiBrowse
                                            • 125.141.76.130
                                            meth8.elfGet hashmaliciousMiraiBrowse
                                            • 125.145.182.80
                                            meth1.elfGet hashmaliciousMiraiBrowse
                                            • 175.219.152.134
                                            arm4.elfGet hashmaliciousUnknownBrowse
                                            • 168.126.237.244
                                            ppc.elfGet hashmaliciousUnknownBrowse
                                            • 49.62.1.8
                                            i686.elfGet hashmaliciousUnknownBrowse
                                            • 218.148.15.61
                                            x86.elfGet hashmaliciousUnknownBrowse
                                            • 222.100.31.30
                                            GIGAINFRASoftbankBBCorpJPsUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                            • 126.245.156.111
                                            MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                            • 126.245.102.34
                                            Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                            • 219.174.245.132
                                            meth10.elfGet hashmaliciousMiraiBrowse
                                            • 60.132.41.97
                                            meth3.elfGet hashmaliciousMiraiBrowse
                                            • 219.40.50.142
                                            meth8.elfGet hashmaliciousMiraiBrowse
                                            • 219.206.176.119
                                            arm4.elfGet hashmaliciousUnknownBrowse
                                            • 60.131.121.59
                                            ppc.elfGet hashmaliciousUnknownBrowse
                                            • 126.220.122.94
                                            m68k.elfGet hashmaliciousUnknownBrowse
                                            • 220.24.86.106
                                            i686.elfGet hashmaliciousUnknownBrowse
                                            • 221.64.220.35
                                            KIXS-AS-KRKoreaTelecomKRYx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                            • 14.33.85.1
                                            5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                            • 222.117.242.2
                                            mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                            • 14.86.25.59
                                            meth3.elfGet hashmaliciousMiraiBrowse
                                            • 125.141.76.130
                                            meth8.elfGet hashmaliciousMiraiBrowse
                                            • 125.145.182.80
                                            meth1.elfGet hashmaliciousMiraiBrowse
                                            • 175.219.152.134
                                            arm4.elfGet hashmaliciousUnknownBrowse
                                            • 168.126.237.244
                                            ppc.elfGet hashmaliciousUnknownBrowse
                                            • 49.62.1.8
                                            i686.elfGet hashmaliciousUnknownBrowse
                                            • 218.148.15.61
                                            x86.elfGet hashmaliciousUnknownBrowse
                                            • 222.100.31.30
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            1138de370e523e824bbca92d049a3777m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                            • 23.206.229.209
                                            sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                            • 23.206.229.209
                                            MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                            • 23.206.229.209
                                            mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                            • 23.206.229.209
                                            http://titanys.mindsetmatters.buzzGet hashmaliciousScreenConnect ToolBrowse
                                            • 23.206.229.209
                                            Document_31055.pdfGet hashmaliciousUnknownBrowse
                                            • 23.206.229.209
                                            Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                            • 23.206.229.209
                                            https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                            • 23.206.229.209
                                            Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                            • 23.206.229.209
                                            https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                            • 23.206.229.209
                                            No context
                                            Process:C:\Windows\mssecsvr.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.3911323435152685
                                            Encrypted:false
                                            SSDEEP:6144:al4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuN1xOBSqa:K4vF0MYQUMM6VFYLxU
                                            MD5:1C55E74CE95C9E47B02924B91EF7535B
                                            SHA1:A3C6FC671DE3ECA4EA685827B0463FAB9E6022F8
                                            SHA-256:C5E471BDCFF9E55146967F12000263258083297C98FEE31FD5C08EB553FA62E8
                                            SHA-512:9B96F8BD6A641D5808A4C0987414319B3CFBC584522CC3CB12AE7FF6150E9FB8B0B3A58E617762477F0AF713A7F01F00A4E8C833BD2F8A2E14A57DB0E9408894
                                            Malicious:false
                                            Reputation:low
                                            Preview:regfG...G....\.Z.................... ....P......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.Jw..f................................................................................................................................................................................................................................................................................................................................................`.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2281472
                                            Entropy (8bit):6.764218931936953
                                            Encrypted:false
                                            SSDEEP:49152:VnFQqMSPbcBVQej/L+TSqTdX1HkQ6Rdhnvn:ZeqPoBhzLcSUDk7dhvn
                                            MD5:E5CFF35706AB7BDAFA5F00F6FAD7058D
                                            SHA1:A6756E9DB3524A9C9E43F6D7EC5864D7FD5D4EDD
                                            SHA-256:F031E5EB924B34B12C60E89ECA094091271F3481236FFB94C4E97215364F3D7D
                                            SHA-512:29721639BD0377430B747AB8913749BAAFF8B8C425B136FDB86876A30583EFE540B1459AFD45152E00D95FA90E0D07AAD91DD34A70D601989261934AC98AF6A3
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvr.exe, Author: ReversingLabs
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L......................"...................@...........................P......................................................1..z...........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc.........1...... ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):3.4836688678200654
                                            TrID:
                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                            • DOS Executable Generic (2002/1) 0.20%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:eIZi481eP6.dll
                                            File size:5'267'459 bytes
                                            MD5:7d7bf2240e76f419611094080e31948b
                                            SHA1:471955bc47b05691cb6e4d745b08ca6f5de3d335
                                            SHA256:9b1ba31dfc982db0bad465668a06e241534ddb379d4ee3cf33946b29cddd994c
                                            SHA512:e9c69c12b5ee003c5cdb67cfa14595e1438c19f7fed316cc009e8d6d6267781887042a059bcc2425770c8a9e3264f85725172c9b34870abb5bff7b82f01d07de
                                            SSDEEP:49152:MnFQqMSPbcBVQej/L+TSqTdX1HkQ6Rdhnv:seqPoBhzLcSUDk7dhv
                                            TLSH:53362319717CD2FCC60926B464678A2792B33C6626FE560F8F408B661C13B15FBA8B47
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                            Icon Hash:7ae282899bbab082
                                            Entrypoint:0x100011e9
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x10000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                            DLL Characteristics:
                                            Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push ebx
                                            mov ebx, dword ptr [ebp+08h]
                                            push esi
                                            mov esi, dword ptr [ebp+0Ch]
                                            push edi
                                            mov edi, dword ptr [ebp+10h]
                                            test esi, esi
                                            jne 00007FF32C862F8Bh
                                            cmp dword ptr [10003140h], 00000000h
                                            jmp 00007FF32C862FA8h
                                            cmp esi, 01h
                                            je 00007FF32C862F87h
                                            cmp esi, 02h
                                            jne 00007FF32C862FA4h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007FF32C862F8Bh
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            test eax, eax
                                            je 00007FF32C862F8Eh
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007FF32C862E9Ah
                                            test eax, eax
                                            jne 00007FF32C862F86h
                                            xor eax, eax
                                            jmp 00007FF32C862FD0h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007FF32C862D4Ch
                                            cmp esi, 01h
                                            mov dword ptr [ebp+0Ch], eax
                                            jne 00007FF32C862F8Eh
                                            test eax, eax
                                            jne 00007FF32C862FB9h
                                            push edi
                                            push eax
                                            push ebx
                                            call 00007FF32C862E76h
                                            test esi, esi
                                            je 00007FF32C862F87h
                                            cmp esi, 03h
                                            jne 00007FF32C862FA8h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007FF32C862E65h
                                            test eax, eax
                                            jne 00007FF32C862F85h
                                            and dword ptr [ebp+0Ch], eax
                                            cmp dword ptr [ebp+0Ch], 00000000h
                                            je 00007FF32C862F93h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007FF32C862F8Ah
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            mov dword ptr [ebp+0Ch], eax
                                            mov eax, dword ptr [ebp+0Ch]
                                            pop edi
                                            pop esi
                                            pop ebx
                                            pop ebp
                                            retn 000Ch
                                            jmp dword ptr [10002028h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            Programming Language:
                                            • [ C ] VS98 (6.0) build 8168
                                            • [C++] VS98 (6.0) build 8168
                                            • [RES] VS98 (6.0) cvtres build 1720
                                            • [LNK] VS98 (6.0) imp/exp build 8168
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x40000x5000600x50100082044d1d00f81dbb3ce9371781516e7funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            W0x40600x500000dataEnglishUnited States0.8770942687988281
                                            DLLImport
                                            KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                            MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                            NameOrdinalAddress
                                            PlayGame10x10001114
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-01-14T21:11:35.762015+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.9634231.1.1.153UDP
                                            2025-01-14T21:11:36.688859+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949750103.224.212.21580TCP
                                            2025-01-14T21:11:38.632358+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949763103.224.212.21580TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 14, 2025 21:11:27.571202040 CET49676443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:27.573601961 CET49675443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:27.696180105 CET49674443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:29.086805105 CET49677443192.168.2.920.189.173.11
                                            Jan 14, 2025 21:11:33.899280071 CET49677443192.168.2.920.189.173.11
                                            Jan 14, 2025 21:11:35.102381945 CET49673443192.168.2.9204.79.197.203
                                            Jan 14, 2025 21:11:36.070642948 CET4975080192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:36.075500965 CET8049750103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:36.075596094 CET4975080192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:36.076215029 CET4975080192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:36.080972910 CET8049750103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:36.688776016 CET8049750103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:36.688858986 CET4975080192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:36.689058065 CET8049750103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:36.689125061 CET4975080192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:36.693301916 CET4975080192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:36.698190928 CET8049750103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:37.180499077 CET49676443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:37.180519104 CET49675443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:37.181010962 CET4975980192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:37.185837030 CET8049759199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:37.185911894 CET4975980192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:37.186114073 CET4975980192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:37.190876961 CET8049759199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:37.305502892 CET49674443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:37.679440975 CET8049759199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:37.679467916 CET8049759199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:37.679526091 CET4975980192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:37.685441017 CET4975980192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:37.685493946 CET4975980192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:37.970024109 CET4976380192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:37.974904060 CET8049763103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:37.974977970 CET4976380192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:37.975275040 CET4976380192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:37.980071068 CET8049763103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.185477018 CET4976780192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.190238953 CET8049767103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.190308094 CET4976780192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.190596104 CET4976780192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.195388079 CET8049767103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.632237911 CET8049763103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.632358074 CET4976380192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.635220051 CET8049763103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.635286093 CET4976380192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.663374901 CET4976380192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.668210983 CET8049763103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.680965900 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:38.685902119 CET8049770199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:38.685975075 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:38.705323935 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:38.710462093 CET8049770199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:38.798507929 CET8049767103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.798583984 CET4976780192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.798595905 CET8049767103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.798652887 CET4976780192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.815490961 CET4976780192.168.2.9103.224.212.215
                                            Jan 14, 2025 21:11:38.816876888 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:38.820579052 CET8049767103.224.212.215192.168.2.9
                                            Jan 14, 2025 21:11:38.821804047 CET8049772199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:38.825649023 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:38.828464031 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:38.833388090 CET8049772199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:39.084530115 CET4434970423.206.229.209192.168.2.9
                                            Jan 14, 2025 21:11:39.085836887 CET49704443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:39.162502050 CET8049770199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:39.162554979 CET8049770199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:39.162583113 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.162653923 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.168864965 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.168896914 CET4977080192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.205631018 CET49776445192.168.2.9174.249.30.18
                                            Jan 14, 2025 21:11:39.210727930 CET44549776174.249.30.18192.168.2.9
                                            Jan 14, 2025 21:11:39.210799932 CET49776445192.168.2.9174.249.30.18
                                            Jan 14, 2025 21:11:39.210871935 CET49776445192.168.2.9174.249.30.18
                                            Jan 14, 2025 21:11:39.212968111 CET49777445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.215890884 CET44549776174.249.30.18192.168.2.9
                                            Jan 14, 2025 21:11:39.216079950 CET49776445192.168.2.9174.249.30.18
                                            Jan 14, 2025 21:11:39.217885971 CET44549777174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:11:39.217977047 CET49777445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.219058037 CET49777445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.222820044 CET49778445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.223992109 CET44549777174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:11:39.224054098 CET49777445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.227746964 CET44549778174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:11:39.227946043 CET49778445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.227946043 CET49778445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:11:39.232810974 CET44549778174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:11:39.310545921 CET8049772199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:39.310574055 CET8049772199.59.243.228192.168.2.9
                                            Jan 14, 2025 21:11:39.310614109 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.310667038 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.325267076 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:39.325314045 CET4977280192.168.2.9199.59.243.228
                                            Jan 14, 2025 21:11:41.215493917 CET49813445192.168.2.9180.146.240.14
                                            Jan 14, 2025 21:11:41.220352888 CET44549813180.146.240.14192.168.2.9
                                            Jan 14, 2025 21:11:41.220427990 CET49813445192.168.2.9180.146.240.14
                                            Jan 14, 2025 21:11:41.220452070 CET49813445192.168.2.9180.146.240.14
                                            Jan 14, 2025 21:11:41.221389055 CET49814445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:41.226253986 CET44549813180.146.240.14192.168.2.9
                                            Jan 14, 2025 21:11:41.226289034 CET44549814180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:11:41.226311922 CET49813445192.168.2.9180.146.240.14
                                            Jan 14, 2025 21:11:41.226347923 CET49814445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:41.226428986 CET49814445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:41.228110075 CET49815445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:41.232315063 CET44549814180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:11:41.232956886 CET44549815180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:11:41.233068943 CET49815445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:41.233068943 CET49815445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:41.237981081 CET44549815180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:11:41.254093885 CET44549814180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:11:41.254163980 CET49814445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:11:43.229053020 CET49852445192.168.2.9189.221.206.70
                                            Jan 14, 2025 21:11:43.236458063 CET44549852189.221.206.70192.168.2.9
                                            Jan 14, 2025 21:11:43.236536026 CET49852445192.168.2.9189.221.206.70
                                            Jan 14, 2025 21:11:43.236568928 CET49852445192.168.2.9189.221.206.70
                                            Jan 14, 2025 21:11:43.236771107 CET49853445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.242067099 CET44549853189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:11:43.242130995 CET49853445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.242176056 CET49853445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.243279934 CET49854445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.248410940 CET44549854189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:11:43.248481035 CET49854445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.248567104 CET49854445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.248723030 CET44549852189.221.206.70192.168.2.9
                                            Jan 14, 2025 21:11:43.248735905 CET44549853189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:11:43.253576040 CET44549854189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:11:43.253904104 CET44549852189.221.206.70192.168.2.9
                                            Jan 14, 2025 21:11:43.253963947 CET49852445192.168.2.9189.221.206.70
                                            Jan 14, 2025 21:11:43.255029917 CET44549853189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:11:43.255075932 CET49853445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:11:43.508698940 CET49677443192.168.2.920.189.173.11
                                            Jan 14, 2025 21:11:45.245430946 CET49886445192.168.2.9153.157.148.172
                                            Jan 14, 2025 21:11:45.250281096 CET44549886153.157.148.172192.168.2.9
                                            Jan 14, 2025 21:11:45.250356913 CET49886445192.168.2.9153.157.148.172
                                            Jan 14, 2025 21:11:45.250514030 CET49886445192.168.2.9153.157.148.172
                                            Jan 14, 2025 21:11:45.250847101 CET49888445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.255609035 CET44549888153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:11:45.255662918 CET49888445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.255736113 CET49888445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.256305933 CET44549886153.157.148.172192.168.2.9
                                            Jan 14, 2025 21:11:45.257380009 CET49889445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.262173891 CET44549889153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:11:45.262236118 CET49889445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.262286901 CET49889445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.262748003 CET44549886153.157.148.172192.168.2.9
                                            Jan 14, 2025 21:11:45.262793064 CET49886445192.168.2.9153.157.148.172
                                            Jan 14, 2025 21:11:45.262947083 CET44549888153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:11:45.262998104 CET49888445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:11:45.267141104 CET44549889153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:11:47.260010958 CET49924445192.168.2.9192.130.61.132
                                            Jan 14, 2025 21:11:47.264947891 CET44549924192.130.61.132192.168.2.9
                                            Jan 14, 2025 21:11:47.265024900 CET49924445192.168.2.9192.130.61.132
                                            Jan 14, 2025 21:11:47.270160913 CET49924445192.168.2.9192.130.61.132
                                            Jan 14, 2025 21:11:47.270391941 CET49925445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:47.275232077 CET44549925192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:11:47.275331974 CET49925445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:47.275465012 CET49925445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:47.276273966 CET44549924192.130.61.132192.168.2.9
                                            Jan 14, 2025 21:11:47.276479006 CET49927445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:47.281327963 CET44549927192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:11:47.281410933 CET49927445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:47.281506062 CET49927445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:47.284276009 CET44549925192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:11:47.285885096 CET44549924192.130.61.132192.168.2.9
                                            Jan 14, 2025 21:11:47.285938025 CET49924445192.168.2.9192.130.61.132
                                            Jan 14, 2025 21:11:47.286261082 CET44549927192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:11:47.286792040 CET44549925192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:11:47.286839008 CET49925445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:11:49.186892033 CET49704443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:49.186965942 CET49704443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:49.187391043 CET49959443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:49.187439919 CET4434995923.206.229.209192.168.2.9
                                            Jan 14, 2025 21:11:49.187501907 CET49959443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:49.187805891 CET49959443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:49.187824011 CET4434995923.206.229.209192.168.2.9
                                            Jan 14, 2025 21:11:49.191814899 CET4434970423.206.229.209192.168.2.9
                                            Jan 14, 2025 21:11:49.191833973 CET4434970423.206.229.209192.168.2.9
                                            Jan 14, 2025 21:11:49.275507927 CET49961445192.168.2.914.83.224.183
                                            Jan 14, 2025 21:11:49.280599117 CET4454996114.83.224.183192.168.2.9
                                            Jan 14, 2025 21:11:49.280674934 CET49961445192.168.2.914.83.224.183
                                            Jan 14, 2025 21:11:49.280736923 CET49961445192.168.2.914.83.224.183
                                            Jan 14, 2025 21:11:49.280997038 CET49962445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.285774946 CET4454996214.83.224.1192.168.2.9
                                            Jan 14, 2025 21:11:49.285826921 CET4454996114.83.224.183192.168.2.9
                                            Jan 14, 2025 21:11:49.285862923 CET49962445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.285880089 CET49962445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.285885096 CET49961445192.168.2.914.83.224.183
                                            Jan 14, 2025 21:11:49.287111998 CET49963445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.291882038 CET4454996314.83.224.1192.168.2.9
                                            Jan 14, 2025 21:11:49.291944981 CET49963445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.292031050 CET49963445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.292290926 CET4454996214.83.224.1192.168.2.9
                                            Jan 14, 2025 21:11:49.295488119 CET4454996214.83.224.1192.168.2.9
                                            Jan 14, 2025 21:11:49.295641899 CET49962445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:11:49.296777964 CET4454996314.83.224.1192.168.2.9
                                            Jan 14, 2025 21:11:49.786879063 CET4434995923.206.229.209192.168.2.9
                                            Jan 14, 2025 21:11:49.786978960 CET49959443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:11:51.290527105 CET49997445192.168.2.91.153.139.213
                                            Jan 14, 2025 21:11:51.296464920 CET445499971.153.139.213192.168.2.9
                                            Jan 14, 2025 21:11:51.296647072 CET49997445192.168.2.91.153.139.213
                                            Jan 14, 2025 21:11:51.296647072 CET49997445192.168.2.91.153.139.213
                                            Jan 14, 2025 21:11:51.296813011 CET49998445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.302719116 CET445499981.153.139.1192.168.2.9
                                            Jan 14, 2025 21:11:51.302784920 CET49998445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.302840948 CET49998445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.303159952 CET49999445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.303505898 CET445499971.153.139.213192.168.2.9
                                            Jan 14, 2025 21:11:51.303637028 CET49997445192.168.2.91.153.139.213
                                            Jan 14, 2025 21:11:51.308832884 CET445499981.153.139.1192.168.2.9
                                            Jan 14, 2025 21:11:51.308897018 CET49998445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.308989048 CET445499991.153.139.1192.168.2.9
                                            Jan 14, 2025 21:11:51.309756041 CET49999445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.309756041 CET49999445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:11:51.315558910 CET445499991.153.139.1192.168.2.9
                                            Jan 14, 2025 21:11:53.306504965 CET50034445192.168.2.911.220.125.22
                                            Jan 14, 2025 21:11:53.311485052 CET4455003411.220.125.22192.168.2.9
                                            Jan 14, 2025 21:11:53.311592102 CET50034445192.168.2.911.220.125.22
                                            Jan 14, 2025 21:11:53.311686039 CET50034445192.168.2.911.220.125.22
                                            Jan 14, 2025 21:11:53.311867952 CET50035445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.316781044 CET4455003511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:11:53.316888094 CET50035445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.316972017 CET50035445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.317047119 CET4455003411.220.125.22192.168.2.9
                                            Jan 14, 2025 21:11:53.317202091 CET50036445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.317251921 CET50034445192.168.2.911.220.125.22
                                            Jan 14, 2025 21:11:53.322123051 CET4455003611.220.125.1192.168.2.9
                                            Jan 14, 2025 21:11:53.323122025 CET50036445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.323224068 CET50036445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.324321985 CET4455003511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:11:53.324373960 CET4455003511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:11:53.324490070 CET50035445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:11:53.328064919 CET4455003611.220.125.1192.168.2.9
                                            Jan 14, 2025 21:11:55.321702957 CET50072445192.168.2.9126.147.175.206
                                            Jan 14, 2025 21:11:55.326612949 CET44550072126.147.175.206192.168.2.9
                                            Jan 14, 2025 21:11:55.326689959 CET50072445192.168.2.9126.147.175.206
                                            Jan 14, 2025 21:11:55.326710939 CET50072445192.168.2.9126.147.175.206
                                            Jan 14, 2025 21:11:55.326828957 CET50073445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.331653118 CET44550073126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:11:55.331727028 CET50073445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.331799984 CET50073445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.332197905 CET50074445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.332288027 CET44550072126.147.175.206192.168.2.9
                                            Jan 14, 2025 21:11:55.333347082 CET44550072126.147.175.206192.168.2.9
                                            Jan 14, 2025 21:11:55.333408117 CET50072445192.168.2.9126.147.175.206
                                            Jan 14, 2025 21:11:55.337091923 CET44550074126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:11:55.337162018 CET50074445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.337193966 CET50074445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.337291956 CET44550073126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:11:55.337589979 CET50073445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:11:55.342108965 CET44550074126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:11:57.337412119 CET50105445192.168.2.9168.102.177.212
                                            Jan 14, 2025 21:11:57.342447042 CET44550105168.102.177.212192.168.2.9
                                            Jan 14, 2025 21:11:57.342533112 CET50105445192.168.2.9168.102.177.212
                                            Jan 14, 2025 21:11:57.342576027 CET50105445192.168.2.9168.102.177.212
                                            Jan 14, 2025 21:11:57.342720032 CET50106445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.347512960 CET44550106168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:11:57.347578049 CET50106445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.347592115 CET50106445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.347614050 CET44550105168.102.177.212192.168.2.9
                                            Jan 14, 2025 21:11:57.347676039 CET50105445192.168.2.9168.102.177.212
                                            Jan 14, 2025 21:11:57.347882032 CET50107445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.352560043 CET44550106168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:11:57.352608919 CET50106445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.352654934 CET44550107168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:11:57.352718115 CET50107445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.352771044 CET50107445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:11:57.357564926 CET44550107168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:11:59.353022099 CET50140445192.168.2.958.51.75.195
                                            Jan 14, 2025 21:11:59.359275103 CET4455014058.51.75.195192.168.2.9
                                            Jan 14, 2025 21:11:59.359378099 CET50140445192.168.2.958.51.75.195
                                            Jan 14, 2025 21:11:59.359447956 CET50140445192.168.2.958.51.75.195
                                            Jan 14, 2025 21:11:59.359582901 CET50141445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.365221024 CET4455014058.51.75.195192.168.2.9
                                            Jan 14, 2025 21:11:59.365302086 CET50140445192.168.2.958.51.75.195
                                            Jan 14, 2025 21:11:59.365504026 CET4455014158.51.75.1192.168.2.9
                                            Jan 14, 2025 21:11:59.365580082 CET50141445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.365638018 CET50141445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.365930080 CET50142445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.371834040 CET4455014258.51.75.1192.168.2.9
                                            Jan 14, 2025 21:11:59.371913910 CET50142445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.371938944 CET4455014158.51.75.1192.168.2.9
                                            Jan 14, 2025 21:11:59.371941090 CET50142445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.371989965 CET50141445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:11:59.376760006 CET4455014258.51.75.1192.168.2.9
                                            Jan 14, 2025 21:12:00.621687889 CET44549778174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:00.622034073 CET49778445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:00.622119904 CET49778445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:00.622119904 CET49778445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:00.626890898 CET44549778174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:00.626909018 CET44549778174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:01.380669117 CET50179445192.168.2.92.65.247.53
                                            Jan 14, 2025 21:12:01.385476112 CET445501792.65.247.53192.168.2.9
                                            Jan 14, 2025 21:12:01.385550022 CET50179445192.168.2.92.65.247.53
                                            Jan 14, 2025 21:12:01.385596037 CET50179445192.168.2.92.65.247.53
                                            Jan 14, 2025 21:12:01.385761976 CET50180445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.390588045 CET445501802.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:01.390666008 CET50180445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.390712976 CET50180445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.390961885 CET445501792.65.247.53192.168.2.9
                                            Jan 14, 2025 21:12:01.391012907 CET50179445192.168.2.92.65.247.53
                                            Jan 14, 2025 21:12:01.391073942 CET50181445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.395620108 CET445501802.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:01.395675898 CET50180445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.395942926 CET445501812.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:01.396290064 CET50181445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.396322966 CET50181445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:01.401094913 CET445501812.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:02.639494896 CET44549815180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:02.639658928 CET49815445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:02.639765978 CET49815445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:02.639847040 CET49815445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:02.644646883 CET44549815180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:02.644682884 CET44549815180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:03.495122910 CET50214445192.168.2.983.144.215.228
                                            Jan 14, 2025 21:12:03.499948978 CET4455021483.144.215.228192.168.2.9
                                            Jan 14, 2025 21:12:03.499996901 CET50214445192.168.2.983.144.215.228
                                            Jan 14, 2025 21:12:03.500071049 CET50214445192.168.2.983.144.215.228
                                            Jan 14, 2025 21:12:03.500416994 CET50217445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.504975080 CET4455021483.144.215.228192.168.2.9
                                            Jan 14, 2025 21:12:03.505017042 CET50214445192.168.2.983.144.215.228
                                            Jan 14, 2025 21:12:03.505189896 CET4455021783.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:03.505237103 CET50217445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.505486012 CET50217445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.505825043 CET50219445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.510221958 CET4455021783.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:03.510262012 CET50217445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.510575056 CET4455021983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:03.510620117 CET50219445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.510682106 CET50219445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:03.515399933 CET4455021983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:03.634111881 CET50224445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:03.638952971 CET44550224174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:03.639004946 CET50224445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:03.639046907 CET50224445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:03.643811941 CET44550224174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:04.590909958 CET44549854189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:04.591049910 CET49854445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:04.591049910 CET49854445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:04.591146946 CET49854445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:04.595932007 CET44549854189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:04.595942974 CET44549854189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:05.433681965 CET50236445192.168.2.9145.91.202.42
                                            Jan 14, 2025 21:12:05.438613892 CET44550236145.91.202.42192.168.2.9
                                            Jan 14, 2025 21:12:05.438725948 CET50236445192.168.2.9145.91.202.42
                                            Jan 14, 2025 21:12:05.438922882 CET50236445192.168.2.9145.91.202.42
                                            Jan 14, 2025 21:12:05.438934088 CET50237445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.443798065 CET44550237145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:05.443809986 CET44550236145.91.202.42192.168.2.9
                                            Jan 14, 2025 21:12:05.443902969 CET50236445192.168.2.9145.91.202.42
                                            Jan 14, 2025 21:12:05.443911076 CET50237445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.444123983 CET50237445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.444474936 CET50238445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.448925018 CET44550237145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:05.449105978 CET50237445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.449316025 CET44550238145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:05.451771975 CET50238445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.451834917 CET50238445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:05.456631899 CET44550238145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:05.649709940 CET50239445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:05.654906034 CET44550239180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:05.654985905 CET50239445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:05.655055046 CET50239445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:05.659859896 CET44550239180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:06.606246948 CET44549889153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:06.606376886 CET49889445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:06.606460094 CET49889445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:06.606564045 CET49889445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:06.611248016 CET44549889153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:06.611295938 CET44549889153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:07.446768999 CET50254445192.168.2.9183.48.5.237
                                            Jan 14, 2025 21:12:07.451848984 CET44550254183.48.5.237192.168.2.9
                                            Jan 14, 2025 21:12:07.451931953 CET50254445192.168.2.9183.48.5.237
                                            Jan 14, 2025 21:12:07.452023029 CET50254445192.168.2.9183.48.5.237
                                            Jan 14, 2025 21:12:07.452188015 CET50255445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.457004070 CET44550254183.48.5.237192.168.2.9
                                            Jan 14, 2025 21:12:07.457057953 CET50254445192.168.2.9183.48.5.237
                                            Jan 14, 2025 21:12:07.457101107 CET44550255183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:07.457190990 CET50255445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.457216024 CET50255445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.457546949 CET50256445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.462349892 CET44550255183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:07.462400913 CET50255445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.462555885 CET44550256183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:07.462615013 CET50256445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.462644100 CET50256445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:07.467917919 CET44550256183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:07.611008883 CET50258445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:07.615956068 CET44550258189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:07.616039991 CET50258445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:07.616199017 CET50258445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:07.620945930 CET44550258189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:08.654908895 CET44549927192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:08.655050993 CET49927445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:08.655050993 CET49927445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:08.655142069 CET49927445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:08.659806967 CET44549927192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:08.659854889 CET44549927192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:08.963254929 CET4434995923.206.229.209192.168.2.9
                                            Jan 14, 2025 21:12:08.963977098 CET49959443192.168.2.923.206.229.209
                                            Jan 14, 2025 21:12:09.462295055 CET50269445192.168.2.9187.16.168.99
                                            Jan 14, 2025 21:12:09.467187881 CET44550269187.16.168.99192.168.2.9
                                            Jan 14, 2025 21:12:09.467291117 CET50269445192.168.2.9187.16.168.99
                                            Jan 14, 2025 21:12:09.467291117 CET50269445192.168.2.9187.16.168.99
                                            Jan 14, 2025 21:12:09.467499018 CET50270445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.472413063 CET44550269187.16.168.99192.168.2.9
                                            Jan 14, 2025 21:12:09.472443104 CET44550269187.16.168.99192.168.2.9
                                            Jan 14, 2025 21:12:09.472472906 CET44550270187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:09.472496986 CET50269445192.168.2.9187.16.168.99
                                            Jan 14, 2025 21:12:09.472553015 CET50270445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.472642899 CET50270445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.472954988 CET50271445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.477559090 CET44550270187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:09.477683067 CET50270445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.477802992 CET44550271187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:09.477861881 CET50271445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.477889061 CET50271445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:09.482687950 CET44550271187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:09.621969938 CET50274445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:09.626786947 CET44550274153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:09.626848936 CET50274445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:09.626888037 CET50274445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:09.631638050 CET44550274153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:10.637715101 CET4454996314.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:10.637789011 CET49963445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:10.637839079 CET49963445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:10.637927055 CET49963445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:10.642610073 CET4454996314.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:10.642644882 CET4454996314.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:11.477982044 CET50288445192.168.2.9189.79.98.248
                                            Jan 14, 2025 21:12:11.482894897 CET44550288189.79.98.248192.168.2.9
                                            Jan 14, 2025 21:12:11.483067989 CET50288445192.168.2.9189.79.98.248
                                            Jan 14, 2025 21:12:11.483103991 CET50288445192.168.2.9189.79.98.248
                                            Jan 14, 2025 21:12:11.483314991 CET50289445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.487994909 CET44550288189.79.98.248192.168.2.9
                                            Jan 14, 2025 21:12:11.488049030 CET50288445192.168.2.9189.79.98.248
                                            Jan 14, 2025 21:12:11.489684105 CET44550289189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:11.489820957 CET50289445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.489821911 CET50289445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.490060091 CET50290445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.494774103 CET44550289189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:11.494832993 CET50289445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.495374918 CET44550290189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:11.495434046 CET50290445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.495454073 CET50290445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:11.500215054 CET44550290189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:11.665405035 CET50291445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:11.670327902 CET44550291192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:11.670409918 CET50291445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:11.670496941 CET50291445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:11.675348043 CET44550291192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:12.702173948 CET445499991.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:12.704395056 CET49999445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:12.705343962 CET49999445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:12.705450058 CET49999445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:12.710184097 CET445499991.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:12.710210085 CET445499991.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:13.495155096 CET50294445192.168.2.9159.61.241.64
                                            Jan 14, 2025 21:12:13.500164032 CET44550294159.61.241.64192.168.2.9
                                            Jan 14, 2025 21:12:13.500241995 CET50294445192.168.2.9159.61.241.64
                                            Jan 14, 2025 21:12:13.500282049 CET50294445192.168.2.9159.61.241.64
                                            Jan 14, 2025 21:12:13.500510931 CET50295445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.505337000 CET44550294159.61.241.64192.168.2.9
                                            Jan 14, 2025 21:12:13.505419016 CET50294445192.168.2.9159.61.241.64
                                            Jan 14, 2025 21:12:13.505434990 CET44550295159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:13.505599022 CET50295445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.505599022 CET50295445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.505902052 CET50296445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.510710955 CET44550295159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:13.510768890 CET50295445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.510770082 CET44550296159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:13.510838032 CET50296445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.510894060 CET50296445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:13.516697884 CET44550296159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:13.649954081 CET50297445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:13.654928923 CET4455029714.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:13.655009985 CET50297445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:13.655061007 CET50297445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:13.659818888 CET4455029714.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:14.684684038 CET4455003611.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:14.684837103 CET50036445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:14.684838057 CET50036445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:14.684932947 CET50036445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:14.689862013 CET4455003611.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:14.689877987 CET4455003611.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:15.368606091 CET50298445192.168.2.97.224.74.160
                                            Jan 14, 2025 21:12:15.373541117 CET445502987.224.74.160192.168.2.9
                                            Jan 14, 2025 21:12:15.373684883 CET50298445192.168.2.97.224.74.160
                                            Jan 14, 2025 21:12:15.373720884 CET50298445192.168.2.97.224.74.160
                                            Jan 14, 2025 21:12:15.373934031 CET50299445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.378793001 CET445502997.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:15.378901958 CET50299445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.378961086 CET50299445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.379303932 CET50300445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.379729986 CET445502987.224.74.160192.168.2.9
                                            Jan 14, 2025 21:12:15.379905939 CET50298445192.168.2.97.224.74.160
                                            Jan 14, 2025 21:12:15.384073973 CET445502997.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:15.384100914 CET445503007.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:15.384162903 CET50300445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.384169102 CET50299445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.384227037 CET50300445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:15.389055967 CET445503007.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:15.712070942 CET50301445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:15.717125893 CET445503011.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:15.717201948 CET50301445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:15.717247009 CET50301445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:15.722085953 CET445503011.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:16.735521078 CET44550074126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:16.735661983 CET50074445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:16.735662937 CET50074445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:16.735748053 CET50074445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:16.740685940 CET44550074126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:16.740717888 CET44550074126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:17.121690989 CET50302445192.168.2.973.53.142.49
                                            Jan 14, 2025 21:12:17.126610041 CET4455030273.53.142.49192.168.2.9
                                            Jan 14, 2025 21:12:17.126787901 CET50302445192.168.2.973.53.142.49
                                            Jan 14, 2025 21:12:17.126787901 CET50302445192.168.2.973.53.142.49
                                            Jan 14, 2025 21:12:17.127032042 CET50303445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.131755114 CET4455030273.53.142.49192.168.2.9
                                            Jan 14, 2025 21:12:17.131793022 CET4455030373.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:17.131886005 CET50302445192.168.2.973.53.142.49
                                            Jan 14, 2025 21:12:17.131896019 CET50303445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.132038116 CET50303445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.133683920 CET50304445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.137029886 CET4455030373.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:17.137166977 CET50303445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.138500929 CET4455030473.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:17.138602972 CET50304445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.139332056 CET50304445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:17.144109011 CET4455030473.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:17.696646929 CET50305445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:17.701632023 CET4455030511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:17.701853037 CET50305445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:17.701853037 CET50305445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:17.706702948 CET4455030511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:18.733203888 CET44550107168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:12:18.733273029 CET50107445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:18.733310938 CET50107445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:18.733350992 CET50107445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:18.738188982 CET44550107168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:12:18.738200903 CET44550107168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:12:18.759252071 CET50306445192.168.2.9199.34.37.89
                                            Jan 14, 2025 21:12:18.764173985 CET44550306199.34.37.89192.168.2.9
                                            Jan 14, 2025 21:12:18.764256001 CET50306445192.168.2.9199.34.37.89
                                            Jan 14, 2025 21:12:18.764292002 CET50306445192.168.2.9199.34.37.89
                                            Jan 14, 2025 21:12:18.764410019 CET50307445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.769160986 CET44550307199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:18.769232035 CET50307445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.769237995 CET44550306199.34.37.89192.168.2.9
                                            Jan 14, 2025 21:12:18.769287109 CET50306445192.168.2.9199.34.37.89
                                            Jan 14, 2025 21:12:18.769412041 CET50307445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.770015955 CET50308445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.774241924 CET44550307199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:18.774436951 CET50307445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.774764061 CET44550308199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:18.775038958 CET50308445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.775038958 CET50308445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:18.779890060 CET44550308199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:19.743292093 CET50309445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:19.748094082 CET44550309126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:19.748181105 CET50309445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:19.748239994 CET50309445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:19.752996922 CET44550309126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:20.290520906 CET50310445192.168.2.9165.95.110.177
                                            Jan 14, 2025 21:12:20.295953989 CET44550310165.95.110.177192.168.2.9
                                            Jan 14, 2025 21:12:20.296049118 CET50310445192.168.2.9165.95.110.177
                                            Jan 14, 2025 21:12:20.296143055 CET50310445192.168.2.9165.95.110.177
                                            Jan 14, 2025 21:12:20.296331882 CET50311445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.301161051 CET44550311165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:20.301280022 CET50311445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.301347017 CET50311445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.301552057 CET44550310165.95.110.177192.168.2.9
                                            Jan 14, 2025 21:12:20.301609039 CET50310445192.168.2.9165.95.110.177
                                            Jan 14, 2025 21:12:20.301776886 CET50312445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.306503057 CET44550311165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:20.306560993 CET50311445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.306628942 CET44550312165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:20.306694031 CET50312445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.306744099 CET50312445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:20.311536074 CET44550312165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:20.751451969 CET4455014258.51.75.1192.168.2.9
                                            Jan 14, 2025 21:12:20.751517057 CET50142445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:20.751559973 CET50142445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:20.751605988 CET50142445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:20.757283926 CET4455014258.51.75.1192.168.2.9
                                            Jan 14, 2025 21:12:20.757297993 CET4455014258.51.75.1192.168.2.9
                                            Jan 14, 2025 21:12:21.712647915 CET50313445192.168.2.9195.147.126.241
                                            Jan 14, 2025 21:12:21.743612051 CET50314445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:21.761543989 CET44550313195.147.126.241192.168.2.9
                                            Jan 14, 2025 21:12:21.761558056 CET44550314168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:12:21.761914015 CET50313445192.168.2.9195.147.126.241
                                            Jan 14, 2025 21:12:21.762067080 CET50314445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:21.762069941 CET50313445192.168.2.9195.147.126.241
                                            Jan 14, 2025 21:12:21.762319088 CET50314445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:21.762403011 CET50315445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.767057896 CET44550313195.147.126.241192.168.2.9
                                            Jan 14, 2025 21:12:21.767110109 CET44550314168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:12:21.767296076 CET44550315195.147.126.1192.168.2.9
                                            Jan 14, 2025 21:12:21.767378092 CET50313445192.168.2.9195.147.126.241
                                            Jan 14, 2025 21:12:21.767430067 CET50315445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.767520905 CET50315445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.767865896 CET50316445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.772775888 CET44550315195.147.126.1192.168.2.9
                                            Jan 14, 2025 21:12:21.772795916 CET44550316195.147.126.1192.168.2.9
                                            Jan 14, 2025 21:12:21.773791075 CET50315445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.773813963 CET50316445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.773854971 CET50316445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:21.778624058 CET44550316195.147.126.1192.168.2.9
                                            Jan 14, 2025 21:12:22.815443039 CET445501812.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:22.815629959 CET50181445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:22.815790892 CET50181445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:22.816093922 CET50181445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:22.820686102 CET445501812.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:22.820949078 CET445501812.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:23.040636063 CET50317445192.168.2.9221.101.136.206
                                            Jan 14, 2025 21:12:23.045772076 CET44550317221.101.136.206192.168.2.9
                                            Jan 14, 2025 21:12:23.045890093 CET50317445192.168.2.9221.101.136.206
                                            Jan 14, 2025 21:12:23.046011925 CET50317445192.168.2.9221.101.136.206
                                            Jan 14, 2025 21:12:23.046241999 CET50318445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.051028967 CET44550317221.101.136.206192.168.2.9
                                            Jan 14, 2025 21:12:23.051100016 CET44550318221.101.136.1192.168.2.9
                                            Jan 14, 2025 21:12:23.051110029 CET50317445192.168.2.9221.101.136.206
                                            Jan 14, 2025 21:12:23.051167965 CET50318445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.051227093 CET50318445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.051558018 CET50319445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.056191921 CET44550318221.101.136.1192.168.2.9
                                            Jan 14, 2025 21:12:23.056248903 CET50318445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.056461096 CET44550319221.101.136.1192.168.2.9
                                            Jan 14, 2025 21:12:23.056520939 CET50319445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.056586027 CET50319445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:23.061399937 CET44550319221.101.136.1192.168.2.9
                                            Jan 14, 2025 21:12:23.384093046 CET4970580192.168.2.9199.232.214.172
                                            Jan 14, 2025 21:12:23.389250994 CET8049705199.232.214.172192.168.2.9
                                            Jan 14, 2025 21:12:23.389389038 CET4970580192.168.2.9199.232.214.172
                                            Jan 14, 2025 21:12:23.759015083 CET50320445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:23.764019012 CET4455032058.51.75.1192.168.2.9
                                            Jan 14, 2025 21:12:23.764760017 CET50320445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:23.764789104 CET50320445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:23.769552946 CET4455032058.51.75.1192.168.2.9
                                            Jan 14, 2025 21:12:24.274885893 CET50321445192.168.2.9165.79.21.227
                                            Jan 14, 2025 21:12:24.279902935 CET44550321165.79.21.227192.168.2.9
                                            Jan 14, 2025 21:12:24.279983997 CET50321445192.168.2.9165.79.21.227
                                            Jan 14, 2025 21:12:24.280014992 CET50321445192.168.2.9165.79.21.227
                                            Jan 14, 2025 21:12:24.280209064 CET50322445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.285100937 CET44550321165.79.21.227192.168.2.9
                                            Jan 14, 2025 21:12:24.285119057 CET44550322165.79.21.1192.168.2.9
                                            Jan 14, 2025 21:12:24.285178900 CET50321445192.168.2.9165.79.21.227
                                            Jan 14, 2025 21:12:24.285202980 CET50322445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.285275936 CET50322445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.285528898 CET50323445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.290168047 CET44550322165.79.21.1192.168.2.9
                                            Jan 14, 2025 21:12:24.290357113 CET44550323165.79.21.1192.168.2.9
                                            Jan 14, 2025 21:12:24.290440083 CET50322445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.290457964 CET50323445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.290509939 CET50323445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:24.295336008 CET44550323165.79.21.1192.168.2.9
                                            Jan 14, 2025 21:12:24.888732910 CET4455021983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:24.888806105 CET50219445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:24.888853073 CET50219445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:24.888876915 CET50219445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:24.893682957 CET4455021983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:24.893702030 CET4455021983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:25.014998913 CET44550224174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:25.015331984 CET50224445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:25.015331984 CET50224445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:25.015388966 CET50224445192.168.2.9174.249.30.1
                                            Jan 14, 2025 21:12:25.020241976 CET44550224174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:25.020262003 CET44550224174.249.30.1192.168.2.9
                                            Jan 14, 2025 21:12:25.071779013 CET50324445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.076807022 CET44550324174.249.30.2192.168.2.9
                                            Jan 14, 2025 21:12:25.077773094 CET50324445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.077816963 CET50324445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.078253984 CET50325445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.082896948 CET44550324174.249.30.2192.168.2.9
                                            Jan 14, 2025 21:12:25.083117008 CET44550325174.249.30.2192.168.2.9
                                            Jan 14, 2025 21:12:25.083179951 CET50324445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.083319902 CET50325445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.085714102 CET50325445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:25.090482950 CET44550325174.249.30.2192.168.2.9
                                            Jan 14, 2025 21:12:25.431195021 CET50327445192.168.2.9160.141.203.86
                                            Jan 14, 2025 21:12:25.436117887 CET44550327160.141.203.86192.168.2.9
                                            Jan 14, 2025 21:12:25.436197996 CET50327445192.168.2.9160.141.203.86
                                            Jan 14, 2025 21:12:25.436274052 CET50327445192.168.2.9160.141.203.86
                                            Jan 14, 2025 21:12:25.436419964 CET50328445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.441395044 CET44550327160.141.203.86192.168.2.9
                                            Jan 14, 2025 21:12:25.441411972 CET44550328160.141.203.1192.168.2.9
                                            Jan 14, 2025 21:12:25.441452026 CET50327445192.168.2.9160.141.203.86
                                            Jan 14, 2025 21:12:25.441490889 CET50328445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.441561937 CET50328445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.442051888 CET50329445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.446490049 CET44550328160.141.203.1192.168.2.9
                                            Jan 14, 2025 21:12:25.446540117 CET50328445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.446964025 CET44550329160.141.203.1192.168.2.9
                                            Jan 14, 2025 21:12:25.447307110 CET50329445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.447343111 CET50329445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:25.452096939 CET44550329160.141.203.1192.168.2.9
                                            Jan 14, 2025 21:12:25.821456909 CET50330445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:25.826447010 CET445503302.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:25.826524973 CET50330445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:25.826580048 CET50330445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:25.831360102 CET445503302.65.247.1192.168.2.9
                                            Jan 14, 2025 21:12:26.509176970 CET50331445192.168.2.9126.233.201.152
                                            Jan 14, 2025 21:12:26.514048100 CET44550331126.233.201.152192.168.2.9
                                            Jan 14, 2025 21:12:26.514117002 CET50331445192.168.2.9126.233.201.152
                                            Jan 14, 2025 21:12:26.514163017 CET50331445192.168.2.9126.233.201.152
                                            Jan 14, 2025 21:12:26.514323950 CET50332445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.519094944 CET44550332126.233.201.1192.168.2.9
                                            Jan 14, 2025 21:12:26.519160032 CET50332445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.519191027 CET50332445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.519298077 CET44550331126.233.201.152192.168.2.9
                                            Jan 14, 2025 21:12:26.519351006 CET50331445192.168.2.9126.233.201.152
                                            Jan 14, 2025 21:12:26.519517899 CET50333445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.524286032 CET44550332126.233.201.1192.168.2.9
                                            Jan 14, 2025 21:12:26.524368048 CET44550333126.233.201.1192.168.2.9
                                            Jan 14, 2025 21:12:26.524380922 CET50332445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.524421930 CET50333445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.524454117 CET50333445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:26.529201984 CET44550333126.233.201.1192.168.2.9
                                            Jan 14, 2025 21:12:26.811487913 CET44550238145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:26.811558008 CET50238445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:26.811593056 CET50238445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:26.811640024 CET50238445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:26.816416979 CET44550238145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:26.816432953 CET44550238145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:27.012928963 CET44550239180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:27.013008118 CET50239445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:27.013079882 CET50239445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:27.013160944 CET50239445192.168.2.9180.146.240.1
                                            Jan 14, 2025 21:12:27.017982006 CET44550239180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:27.018084049 CET44550239180.146.240.1192.168.2.9
                                            Jan 14, 2025 21:12:27.071538925 CET50334445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.076467037 CET44550334180.146.240.2192.168.2.9
                                            Jan 14, 2025 21:12:27.076530933 CET50334445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.076576948 CET50334445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.076927900 CET50335445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.081470013 CET44550334180.146.240.2192.168.2.9
                                            Jan 14, 2025 21:12:27.081536055 CET50334445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.081741095 CET44550335180.146.240.2192.168.2.9
                                            Jan 14, 2025 21:12:27.081808090 CET50335445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.081837893 CET50335445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:27.086595058 CET44550335180.146.240.2192.168.2.9
                                            Jan 14, 2025 21:12:27.524868011 CET50336445192.168.2.9206.89.121.225
                                            Jan 14, 2025 21:12:27.529762030 CET44550336206.89.121.225192.168.2.9
                                            Jan 14, 2025 21:12:27.529850960 CET50336445192.168.2.9206.89.121.225
                                            Jan 14, 2025 21:12:27.529870987 CET50336445192.168.2.9206.89.121.225
                                            Jan 14, 2025 21:12:27.530133963 CET50337445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:27.534976959 CET44550337206.89.121.1192.168.2.9
                                            Jan 14, 2025 21:12:27.534989119 CET44550336206.89.121.225192.168.2.9
                                            Jan 14, 2025 21:12:27.535051107 CET50336445192.168.2.9206.89.121.225
                                            Jan 14, 2025 21:12:27.535062075 CET50337445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:27.535439014 CET50338445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:27.539995909 CET44550337206.89.121.1192.168.2.9
                                            Jan 14, 2025 21:12:27.540097952 CET50337445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:27.540211916 CET44550338206.89.121.1192.168.2.9
                                            Jan 14, 2025 21:12:27.540266991 CET50338445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:27.540290117 CET50338445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:27.545033932 CET44550338206.89.121.1192.168.2.9
                                            Jan 14, 2025 21:12:27.899709940 CET50339445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:27.904613018 CET4455033983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:27.904719114 CET50339445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:27.904756069 CET50339445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:27.909535885 CET4455033983.144.215.1192.168.2.9
                                            Jan 14, 2025 21:12:28.462403059 CET50340445192.168.2.933.196.217.90
                                            Jan 14, 2025 21:12:28.467375994 CET4455034033.196.217.90192.168.2.9
                                            Jan 14, 2025 21:12:28.467454910 CET50340445192.168.2.933.196.217.90
                                            Jan 14, 2025 21:12:28.467519045 CET50340445192.168.2.933.196.217.90
                                            Jan 14, 2025 21:12:28.467665911 CET50341445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.472493887 CET4455034033.196.217.90192.168.2.9
                                            Jan 14, 2025 21:12:28.472507000 CET4455034133.196.217.1192.168.2.9
                                            Jan 14, 2025 21:12:28.472554922 CET50340445192.168.2.933.196.217.90
                                            Jan 14, 2025 21:12:28.472579002 CET50341445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.472635984 CET50341445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.472892046 CET50342445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.477654934 CET4455034133.196.217.1192.168.2.9
                                            Jan 14, 2025 21:12:28.477665901 CET4455034233.196.217.1192.168.2.9
                                            Jan 14, 2025 21:12:28.477709055 CET50341445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.477735996 CET50342445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.477814913 CET50342445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:28.482645035 CET4455034233.196.217.1192.168.2.9
                                            Jan 14, 2025 21:12:28.809938908 CET44550256183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:28.810031891 CET50256445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:28.810101986 CET50256445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:28.810169935 CET50256445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:28.815025091 CET44550256183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:28.815058947 CET44550256183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:28.983989954 CET44550258189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:28.984191895 CET50258445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:28.984313965 CET50258445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:28.984374046 CET50258445192.168.2.9189.221.206.1
                                            Jan 14, 2025 21:12:28.989067078 CET44550258189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:28.989171982 CET44550258189.221.206.1192.168.2.9
                                            Jan 14, 2025 21:12:29.040541887 CET50343445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.045696974 CET44550343189.221.206.2192.168.2.9
                                            Jan 14, 2025 21:12:29.047897100 CET50343445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.047897100 CET50343445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.048199892 CET50344445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.053064108 CET44550344189.221.206.2192.168.2.9
                                            Jan 14, 2025 21:12:29.055793047 CET50344445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.055813074 CET50344445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.060300112 CET44550343189.221.206.2192.168.2.9
                                            Jan 14, 2025 21:12:29.060573101 CET44550344189.221.206.2192.168.2.9
                                            Jan 14, 2025 21:12:29.071997881 CET44550343189.221.206.2192.168.2.9
                                            Jan 14, 2025 21:12:29.075870037 CET50343445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:29.337985992 CET50345445192.168.2.9104.136.62.55
                                            Jan 14, 2025 21:12:29.342809916 CET44550345104.136.62.55192.168.2.9
                                            Jan 14, 2025 21:12:29.344789982 CET50345445192.168.2.9104.136.62.55
                                            Jan 14, 2025 21:12:29.346770048 CET50345445192.168.2.9104.136.62.55
                                            Jan 14, 2025 21:12:29.346959114 CET50346445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.351677895 CET44550346104.136.62.1192.168.2.9
                                            Jan 14, 2025 21:12:29.352252007 CET44550345104.136.62.55192.168.2.9
                                            Jan 14, 2025 21:12:29.352327108 CET50346445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.352365017 CET50346445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.352750063 CET50347445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.354274988 CET44550345104.136.62.55192.168.2.9
                                            Jan 14, 2025 21:12:29.356761932 CET50345445192.168.2.9104.136.62.55
                                            Jan 14, 2025 21:12:29.357175112 CET44550346104.136.62.1192.168.2.9
                                            Jan 14, 2025 21:12:29.357502937 CET44550347104.136.62.1192.168.2.9
                                            Jan 14, 2025 21:12:29.357666016 CET50346445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.357698917 CET50347445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.357810020 CET50347445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:29.362643003 CET44550347104.136.62.1192.168.2.9
                                            Jan 14, 2025 21:12:29.821820974 CET50348445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:29.826668024 CET44550348145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:29.828778028 CET50348445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:29.828831911 CET50348445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:29.833616972 CET44550348145.91.202.1192.168.2.9
                                            Jan 14, 2025 21:12:30.165904999 CET50349445192.168.2.9182.119.252.121
                                            Jan 14, 2025 21:12:30.170907974 CET44550349182.119.252.121192.168.2.9
                                            Jan 14, 2025 21:12:30.171282053 CET50349445192.168.2.9182.119.252.121
                                            Jan 14, 2025 21:12:30.171299934 CET50349445192.168.2.9182.119.252.121
                                            Jan 14, 2025 21:12:30.171436071 CET50350445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.176301956 CET44550350182.119.252.1192.168.2.9
                                            Jan 14, 2025 21:12:30.176357985 CET44550349182.119.252.121192.168.2.9
                                            Jan 14, 2025 21:12:30.176393986 CET44550349182.119.252.121192.168.2.9
                                            Jan 14, 2025 21:12:30.176485062 CET50350445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.176578999 CET50349445192.168.2.9182.119.252.121
                                            Jan 14, 2025 21:12:30.176660061 CET50350445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.176974058 CET50351445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.181476116 CET44550350182.119.252.1192.168.2.9
                                            Jan 14, 2025 21:12:30.181596994 CET50350445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.181859970 CET44550351182.119.252.1192.168.2.9
                                            Jan 14, 2025 21:12:30.181983948 CET50351445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.182029009 CET50351445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:30.186845064 CET44550351182.119.252.1192.168.2.9
                                            Jan 14, 2025 21:12:30.856817961 CET44550271187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:30.857778072 CET50271445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:30.857830048 CET50271445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:30.857873917 CET50271445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:30.862711906 CET44550271187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:30.862721920 CET44550271187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:30.931265116 CET50352445192.168.2.9126.247.214.152
                                            Jan 14, 2025 21:12:30.936244011 CET44550352126.247.214.152192.168.2.9
                                            Jan 14, 2025 21:12:30.936391115 CET50352445192.168.2.9126.247.214.152
                                            Jan 14, 2025 21:12:30.936391115 CET50352445192.168.2.9126.247.214.152
                                            Jan 14, 2025 21:12:30.936595917 CET50353445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.941458941 CET44550353126.247.214.1192.168.2.9
                                            Jan 14, 2025 21:12:30.941538095 CET44550352126.247.214.152192.168.2.9
                                            Jan 14, 2025 21:12:30.941557884 CET50353445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.941631079 CET50353445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.941648960 CET50352445192.168.2.9126.247.214.152
                                            Jan 14, 2025 21:12:30.942001104 CET50354445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.946563959 CET44550353126.247.214.1192.168.2.9
                                            Jan 14, 2025 21:12:30.946628094 CET50353445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.946790934 CET44550354126.247.214.1192.168.2.9
                                            Jan 14, 2025 21:12:30.946937084 CET50354445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.946979046 CET50354445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:30.951720953 CET44550354126.247.214.1192.168.2.9
                                            Jan 14, 2025 21:12:31.001101017 CET44550274153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:31.001257896 CET50274445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:31.001305103 CET50274445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:31.001411915 CET50274445192.168.2.9153.157.148.1
                                            Jan 14, 2025 21:12:31.006167889 CET44550274153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:31.006198883 CET44550274153.157.148.1192.168.2.9
                                            Jan 14, 2025 21:12:31.056452990 CET50355445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.061543941 CET44550355153.157.148.2192.168.2.9
                                            Jan 14, 2025 21:12:31.061748028 CET50355445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.066505909 CET50355445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.067151070 CET50356445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.071365118 CET44550355153.157.148.2192.168.2.9
                                            Jan 14, 2025 21:12:31.071434021 CET50355445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.072026014 CET44550356153.157.148.2192.168.2.9
                                            Jan 14, 2025 21:12:31.072171926 CET50356445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.072210073 CET50356445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:31.076976061 CET44550356153.157.148.2192.168.2.9
                                            Jan 14, 2025 21:12:31.821628094 CET50358445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:31.826565981 CET44550358183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:31.829402924 CET50358445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:31.832328081 CET50358445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:31.837152004 CET44550358183.48.5.1192.168.2.9
                                            Jan 14, 2025 21:12:32.891988993 CET44550290189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:32.892121077 CET50290445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:32.892209053 CET50290445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:32.892251015 CET50290445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:32.897078037 CET44550290189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:32.897188902 CET44550290189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:33.046015024 CET44550291192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:33.046144962 CET50291445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:33.046224117 CET50291445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:33.046293974 CET50291445192.168.2.9192.130.61.1
                                            Jan 14, 2025 21:12:33.050947905 CET44550291192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:33.051069975 CET44550291192.130.61.1192.168.2.9
                                            Jan 14, 2025 21:12:33.102834940 CET50362445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.108071089 CET44550362192.130.61.2192.168.2.9
                                            Jan 14, 2025 21:12:33.108161926 CET50362445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.108222008 CET50362445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.108566999 CET50363445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.113234997 CET44550362192.130.61.2192.168.2.9
                                            Jan 14, 2025 21:12:33.113338947 CET50362445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.113471031 CET44550363192.130.61.2192.168.2.9
                                            Jan 14, 2025 21:12:33.113543987 CET50363445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.113559961 CET50363445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:33.118388891 CET44550363192.130.61.2192.168.2.9
                                            Jan 14, 2025 21:12:33.868308067 CET50366445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:33.873311996 CET44550366187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:33.873413086 CET50366445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:33.873450041 CET50366445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:33.878225088 CET44550366187.16.168.1192.168.2.9
                                            Jan 14, 2025 21:12:34.874198914 CET44550296159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:34.874293089 CET50296445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:34.874360085 CET50296445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:34.874406099 CET50296445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:34.879259109 CET44550296159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:34.879275084 CET44550296159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:35.032619953 CET4455029714.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:35.032716990 CET50297445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:35.032779932 CET50297445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:35.032881021 CET50297445192.168.2.914.83.224.1
                                            Jan 14, 2025 21:12:35.037736893 CET4455029714.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:35.037754059 CET4455029714.83.224.1192.168.2.9
                                            Jan 14, 2025 21:12:35.087785006 CET50375445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.092814922 CET4455037514.83.224.2192.168.2.9
                                            Jan 14, 2025 21:12:35.093048096 CET50375445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.093122005 CET50375445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.093478918 CET50376445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.098110914 CET4455037514.83.224.2192.168.2.9
                                            Jan 14, 2025 21:12:35.098174095 CET50375445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.098277092 CET4455037614.83.224.2192.168.2.9
                                            Jan 14, 2025 21:12:35.098330975 CET50376445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.098388910 CET50376445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:35.103140116 CET4455037614.83.224.2192.168.2.9
                                            Jan 14, 2025 21:12:35.899674892 CET50383445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:35.904623032 CET44550383189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:35.909773111 CET50383445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:35.911998987 CET50383445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:35.916809082 CET44550383189.79.98.1192.168.2.9
                                            Jan 14, 2025 21:12:36.810682058 CET445503007.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:36.810750961 CET50300445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:36.810807943 CET50300445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:36.810853004 CET50300445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:36.815676928 CET445503007.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:36.815691948 CET445503007.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:37.112503052 CET445503011.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:37.112593889 CET50301445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:37.112632036 CET50301445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:37.112664938 CET50301445192.168.2.91.153.139.1
                                            Jan 14, 2025 21:12:37.117464066 CET445503011.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:37.117475986 CET445503011.153.139.1192.168.2.9
                                            Jan 14, 2025 21:12:37.165435076 CET50395445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.170377016 CET445503951.153.139.2192.168.2.9
                                            Jan 14, 2025 21:12:37.170455933 CET50395445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.170511007 CET50395445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.170883894 CET50396445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.175422907 CET445503951.153.139.2192.168.2.9
                                            Jan 14, 2025 21:12:37.175477028 CET50395445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.175645113 CET445503961.153.139.2192.168.2.9
                                            Jan 14, 2025 21:12:37.175754070 CET50396445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.175772905 CET50396445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:37.180519104 CET445503961.153.139.2192.168.2.9
                                            Jan 14, 2025 21:12:37.884026051 CET50407445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:37.889020920 CET44550407159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:37.889117956 CET50407445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:37.889170885 CET50407445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:37.893991947 CET44550407159.61.241.1192.168.2.9
                                            Jan 14, 2025 21:12:38.481930017 CET4455030473.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:38.484860897 CET50304445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:38.546494961 CET50304445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:38.546530008 CET50304445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:38.551480055 CET4455030473.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:38.551495075 CET4455030473.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:39.093344927 CET4455030511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:39.093427896 CET50305445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:39.098356009 CET50305445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:39.098499060 CET50305445192.168.2.911.220.125.1
                                            Jan 14, 2025 21:12:39.103231907 CET4455030511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:39.103307962 CET4455030511.220.125.1192.168.2.9
                                            Jan 14, 2025 21:12:39.149771929 CET50431445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.155000925 CET4455043111.220.125.2192.168.2.9
                                            Jan 14, 2025 21:12:39.155081034 CET50431445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.155113935 CET50431445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.155452967 CET50432445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.160321951 CET4455043211.220.125.2192.168.2.9
                                            Jan 14, 2025 21:12:39.160334110 CET4455043111.220.125.2192.168.2.9
                                            Jan 14, 2025 21:12:39.160379887 CET50432445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.160435915 CET50432445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.160825014 CET4455043111.220.125.2192.168.2.9
                                            Jan 14, 2025 21:12:39.160872936 CET50431445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:39.165342093 CET4455043211.220.125.2192.168.2.9
                                            Jan 14, 2025 21:12:39.821540117 CET50447445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:39.826687098 CET445504477.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:39.829813004 CET50447445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:39.829893112 CET50447445192.168.2.97.224.74.1
                                            Jan 14, 2025 21:12:39.834748983 CET445504477.224.74.1192.168.2.9
                                            Jan 14, 2025 21:12:40.169574022 CET44550308199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:40.169758081 CET50308445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:40.169811010 CET50308445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:40.169851065 CET50308445192.168.2.9199.34.37.1
                                            Jan 14, 2025 21:12:40.174803972 CET44550308199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:40.174813986 CET44550308199.34.37.1192.168.2.9
                                            Jan 14, 2025 21:12:41.107455015 CET44550309126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:41.107516050 CET50309445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:41.107551098 CET50309445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:41.107587099 CET50309445192.168.2.9126.147.175.1
                                            Jan 14, 2025 21:12:41.112396002 CET44550309126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:41.112412930 CET44550309126.147.175.1192.168.2.9
                                            Jan 14, 2025 21:12:41.165494919 CET50486445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.170362949 CET44550486126.147.175.2192.168.2.9
                                            Jan 14, 2025 21:12:41.170439959 CET50486445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.170475006 CET50486445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.170778990 CET50487445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.175605059 CET44550487126.147.175.2192.168.2.9
                                            Jan 14, 2025 21:12:41.175666094 CET50487445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.175694942 CET50487445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.176062107 CET44550486126.147.175.2192.168.2.9
                                            Jan 14, 2025 21:12:41.176114082 CET50486445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:41.180520058 CET44550487126.147.175.2192.168.2.9
                                            Jan 14, 2025 21:12:41.557569981 CET50506445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:41.562536955 CET4455050673.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:41.565886021 CET50506445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:41.565886021 CET50506445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:41.570686102 CET4455050673.53.142.1192.168.2.9
                                            Jan 14, 2025 21:12:41.689204931 CET44550312165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:41.689914942 CET50312445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:41.689914942 CET50312445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:41.689914942 CET50312445192.168.2.9165.95.110.1
                                            Jan 14, 2025 21:12:41.694848061 CET44550312165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:41.694859028 CET44550312165.95.110.1192.168.2.9
                                            Jan 14, 2025 21:12:43.138237000 CET44550316195.147.126.1192.168.2.9
                                            Jan 14, 2025 21:12:43.138298988 CET50316445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:43.139966965 CET44550314168.102.177.1192.168.2.9
                                            Jan 14, 2025 21:12:43.140026093 CET50314445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:44.334861994 CET50344445192.168.2.9189.221.206.2
                                            Jan 14, 2025 21:12:44.334894896 CET50335445192.168.2.9180.146.240.2
                                            Jan 14, 2025 21:12:44.334902048 CET50356445192.168.2.9153.157.148.2
                                            Jan 14, 2025 21:12:44.334985018 CET50325445192.168.2.9174.249.30.2
                                            Jan 14, 2025 21:12:44.335014105 CET50314445192.168.2.9168.102.177.1
                                            Jan 14, 2025 21:12:44.335062027 CET50316445192.168.2.9195.147.126.1
                                            Jan 14, 2025 21:12:44.335073948 CET50319445192.168.2.9221.101.136.1
                                            Jan 14, 2025 21:12:44.335089922 CET50320445192.168.2.958.51.75.1
                                            Jan 14, 2025 21:12:44.335093975 CET50323445192.168.2.9165.79.21.1
                                            Jan 14, 2025 21:12:44.335097075 CET50396445192.168.2.91.153.139.2
                                            Jan 14, 2025 21:12:44.335144997 CET50329445192.168.2.9160.141.203.1
                                            Jan 14, 2025 21:12:44.335155964 CET50330445192.168.2.92.65.247.1
                                            Jan 14, 2025 21:12:44.335185051 CET50338445192.168.2.9206.89.121.1
                                            Jan 14, 2025 21:12:44.335207939 CET50333445192.168.2.9126.233.201.1
                                            Jan 14, 2025 21:12:44.335217953 CET50339445192.168.2.983.144.215.1
                                            Jan 14, 2025 21:12:44.335241079 CET50342445192.168.2.933.196.217.1
                                            Jan 14, 2025 21:12:44.335264921 CET50347445192.168.2.9104.136.62.1
                                            Jan 14, 2025 21:12:44.335268021 CET50348445192.168.2.9145.91.202.1
                                            Jan 14, 2025 21:12:44.335303068 CET50354445192.168.2.9126.247.214.1
                                            Jan 14, 2025 21:12:44.335330009 CET50351445192.168.2.9182.119.252.1
                                            Jan 14, 2025 21:12:44.335330009 CET50366445192.168.2.9187.16.168.1
                                            Jan 14, 2025 21:12:44.335336924 CET50358445192.168.2.9183.48.5.1
                                            Jan 14, 2025 21:12:44.335402966 CET50376445192.168.2.914.83.224.2
                                            Jan 14, 2025 21:12:44.335412979 CET50363445192.168.2.9192.130.61.2
                                            Jan 14, 2025 21:12:44.335442066 CET50407445192.168.2.9159.61.241.1
                                            Jan 14, 2025 21:12:44.335455894 CET50383445192.168.2.9189.79.98.1
                                            Jan 14, 2025 21:12:44.335669041 CET50487445192.168.2.9126.147.175.2
                                            Jan 14, 2025 21:12:44.335675955 CET50506445192.168.2.973.53.142.1
                                            Jan 14, 2025 21:12:44.335715055 CET50432445192.168.2.911.220.125.2
                                            Jan 14, 2025 21:12:44.335715055 CET50447445192.168.2.97.224.74.1
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 14, 2025 21:11:35.762015104 CET6342353192.168.2.91.1.1.1
                                            Jan 14, 2025 21:11:36.064757109 CET53634231.1.1.1192.168.2.9
                                            Jan 14, 2025 21:11:36.695112944 CET6312253192.168.2.91.1.1.1
                                            Jan 14, 2025 21:11:37.180011034 CET53631221.1.1.1192.168.2.9
                                            Jan 14, 2025 21:12:23.990220070 CET138138192.168.2.9192.168.2.255
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 14, 2025 21:11:35.762015104 CET192.168.2.91.1.1.10xe5b6Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                            Jan 14, 2025 21:11:36.695112944 CET192.168.2.91.1.1.10xfa5aStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 14, 2025 21:11:27.845957041 CET1.1.1.1192.168.2.90xad1cNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                            Jan 14, 2025 21:11:27.845957041 CET1.1.1.1192.168.2.90xad1cNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                            Jan 14, 2025 21:11:36.064757109 CET1.1.1.1192.168.2.90xe5b6No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                            Jan 14, 2025 21:11:37.180011034 CET1.1.1.1192.168.2.90xfa5aNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                            Jan 14, 2025 21:11:37.180011034 CET1.1.1.1192.168.2.90xfa5aNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.949750103.224.212.215808088C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 14, 2025 21:11:36.076215029 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Cache-Control: no-cache
                                            Jan 14, 2025 21:11:36.688776016 CET365INHTTP/1.1 302 Found
                                            date: Tue, 14 Jan 2025 20:11:36 GMT
                                            server: Apache
                                            set-cookie: __tad=1736885496.8445919; expires=Fri, 12-Jan-2035 20:11:36 GMT; Max-Age=315360000
                                            location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3621-b2b0-8d3080c051bd
                                            content-length: 2
                                            content-type: text/html; charset=UTF-8
                                            connection: close
                                            Data Raw: 0a 0a
                                            Data Ascii:


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.949759199.59.243.228808088C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 14, 2025 21:11:37.186114073 CET169OUTGET /?subid1=20250115-0711-3621-b2b0-8d3080c051bd HTTP/1.1
                                            Cache-Control: no-cache
                                            Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Connection: Keep-Alive
                                            Jan 14, 2025 21:11:37.679440975 CET1236INHTTP/1.1 200 OK
                                            date: Tue, 14 Jan 2025 20:11:36 GMT
                                            content-type: text/html; charset=utf-8
                                            content-length: 1262
                                            x-request-id: 7ae06bd6-da66-45e5-bf42-511b3c3bec92
                                            cache-control: no-store, max-age=0
                                            accept-ch: sec-ch-prefers-color-scheme
                                            critical-ch: sec-ch-prefers-color-scheme
                                            vary: sec-ch-prefers-color-scheme
                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_MKrMnas0g8ZA5GdybzzZvAUfZAldS3suexBuSZ16YpReZT1X2oscYtpFGoJz5TFcvTSoEynLhBfXNFLCOd1gmw==
                                            set-cookie: parking_session=7ae06bd6-da66-45e5-bf42-511b3c3bec92; expires=Tue, 14 Jan 2025 20:26:37 GMT; path=/
                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4d 4b 72 4d 6e 61 73 30 67 38 5a 41 35 47 64 79 62 7a 7a 5a 76 41 55 66 5a 41 6c 64 53 33 73 75 65 78 42 75 53 5a 31 36 59 70 52 65 5a 54 31 58 32 6f 73 63 59 74 70 46 47 6f 4a 7a 35 54 46 63 76 54 53 6f 45 79 6e 4c 68 42 66 58 4e 46 4c 43 4f 64 31 67 6d 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_MKrMnas0g8ZA5GdybzzZvAUfZAldS3suexBuSZ16YpReZT1X2oscYtpFGoJz5TFcvTSoEynLhBfXNFLCOd1gmw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                            Jan 14, 2025 21:11:37.679467916 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                            Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiN2FlMDZiZDYtZGE2Ni00NWU1LWJmNDItNTExYjNjM2JlYzkyIiwicGFnZV90aW1lIjoxNzM2ODg1NDk3LCJwYWdlX3VybCI6I


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.949763103.224.212.215807188C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 14, 2025 21:11:37.975275040 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Cache-Control: no-cache
                                            Jan 14, 2025 21:11:38.632237911 CET365INHTTP/1.1 302 Found
                                            date: Tue, 14 Jan 2025 20:11:38 GMT
                                            server: Apache
                                            set-cookie: __tad=1736885498.7256743; expires=Fri, 12-Jan-2035 20:11:38 GMT; Max-Age=315360000
                                            location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-38c6-8000-741dcdd985dd
                                            content-length: 2
                                            content-type: text/html; charset=UTF-8
                                            connection: close
                                            Data Raw: 0a 0a
                                            Data Ascii:


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.949767103.224.212.215807336C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 14, 2025 21:11:38.190596104 CET134OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Cache-Control: no-cache
                                            Cookie: __tad=1736885496.8445919
                                            Jan 14, 2025 21:11:38.798507929 CET269INHTTP/1.1 302 Found
                                            date: Tue, 14 Jan 2025 20:11:38 GMT
                                            server: Apache
                                            location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0711-3814-92f5-579ab78879f0
                                            content-length: 2
                                            content-type: text/html; charset=UTF-8
                                            connection: close
                                            Data Raw: 0a 0a
                                            Data Ascii:


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.949770199.59.243.228807188C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 14, 2025 21:11:38.705323935 CET169OUTGET /?subid1=20250115-0711-38c6-8000-741dcdd985dd HTTP/1.1
                                            Cache-Control: no-cache
                                            Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Connection: Keep-Alive
                                            Jan 14, 2025 21:11:39.162502050 CET1236INHTTP/1.1 200 OK
                                            date: Tue, 14 Jan 2025 20:11:38 GMT
                                            content-type: text/html; charset=utf-8
                                            content-length: 1262
                                            x-request-id: 54d6e5ac-c37a-4ba4-8d98-523c5bc64601
                                            cache-control: no-store, max-age=0
                                            accept-ch: sec-ch-prefers-color-scheme
                                            critical-ch: sec-ch-prefers-color-scheme
                                            vary: sec-ch-prefers-color-scheme
                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_lZ1Aj3Iy9aL3pPYvx7odEv7ta9C4tPhdNDMLID0nY5SPUIq5bhFYvjN4RRVy4+6dgu5zkj0X4yhTEr1BH/AelA==
                                            set-cookie: parking_session=54d6e5ac-c37a-4ba4-8d98-523c5bc64601; expires=Tue, 14 Jan 2025 20:26:39 GMT; path=/
                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6c 5a 31 41 6a 33 49 79 39 61 4c 33 70 50 59 76 78 37 6f 64 45 76 37 74 61 39 43 34 74 50 68 64 4e 44 4d 4c 49 44 30 6e 59 35 53 50 55 49 71 35 62 68 46 59 76 6a 4e 34 52 52 56 79 34 2b 36 64 67 75 35 7a 6b 6a 30 58 34 79 68 54 45 72 31 42 48 2f 41 65 6c 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_lZ1Aj3Iy9aL3pPYvx7odEv7ta9C4tPhdNDMLID0nY5SPUIq5bhFYvjN4RRVy4+6dgu5zkj0X4yhTEr1BH/AelA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                            Jan 14, 2025 21:11:39.162554979 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                            Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNTRkNmU1YWMtYzM3YS00YmE0LThkOTgtNTIzYzViYzY0NjAxIiwicGFnZV90aW1lIjoxNzM2ODg1NDk5LCJwYWdlX3VybCI6I


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.949772199.59.243.228807336C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 14, 2025 21:11:38.828464031 CET231OUTGET /?subid1=20250115-0711-3814-92f5-579ab78879f0 HTTP/1.1
                                            Cache-Control: no-cache
                                            Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Connection: Keep-Alive
                                            Cookie: parking_session=7ae06bd6-da66-45e5-bf42-511b3c3bec92
                                            Jan 14, 2025 21:11:39.310545921 CET1236INHTTP/1.1 200 OK
                                            date: Tue, 14 Jan 2025 20:11:38 GMT
                                            content-type: text/html; charset=utf-8
                                            content-length: 1262
                                            x-request-id: 925a4af2-bb33-4d40-8598-7e33e5a107bb
                                            cache-control: no-store, max-age=0
                                            accept-ch: sec-ch-prefers-color-scheme
                                            critical-ch: sec-ch-prefers-color-scheme
                                            vary: sec-ch-prefers-color-scheme
                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_kjMADF7xFci5Vj/Ka3PYtPV5GqsRg6D1CLET6prSRUS/wA7EuvHOPNwIZSPNg0eRwuQwk0yGdszQlRWqG5ASqQ==
                                            set-cookie: parking_session=7ae06bd6-da66-45e5-bf42-511b3c3bec92; expires=Tue, 14 Jan 2025 20:26:39 GMT
                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6b 6a 4d 41 44 46 37 78 46 63 69 35 56 6a 2f 4b 61 33 50 59 74 50 56 35 47 71 73 52 67 36 44 31 43 4c 45 54 36 70 72 53 52 55 53 2f 77 41 37 45 75 76 48 4f 50 4e 77 49 5a 53 50 4e 67 30 65 52 77 75 51 77 6b 30 79 47 64 73 7a 51 6c 52 57 71 47 35 41 53 71 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_kjMADF7xFci5Vj/Ka3PYtPV5GqsRg6D1CLET6prSRUS/wA7EuvHOPNwIZSPNg0eRwuQwk0yGdszQlRWqG5ASqQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                            Jan 14, 2025 21:11:39.310574055 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                            Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiN2FlMDZiZDYtZGE2Ni00NWU1LWJmNDItNTExYjNjM2JlYzkyIiwicGFnZV90aW1lIjoxNzM2ODg1NDk5LCJwYWdlX3VybCI6Imh0dHA6L


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:15:11:33
                                            Start date:14/01/2025
                                            Path:C:\Windows\System32\loaddll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll"
                                            Imagebase:0xad0000
                                            File size:126'464 bytes
                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:15:11:33
                                            Start date:14/01/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff70f010000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:15:11:33
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1
                                            Imagebase:0xc50000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:15:11:33
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\eIZi481eP6.dll,PlayGame
                                            Imagebase:0x920000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:15:11:33
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",#1
                                            Imagebase:0x920000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:15:11:33
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvr.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvr.exe
                                            Imagebase:0x400000
                                            File size:2'281'472 bytes
                                            MD5 hash:E5CFF35706AB7BDAFA5F00F6FAD7058D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1374758568.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1374634946.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvr.exe, Author: ReversingLabs
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:15:11:36
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvr.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                            Imagebase:0x400000
                                            File size:2'281'472 bytes
                                            MD5 hash:E5CFF35706AB7BDAFA5F00F6FAD7058D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1400887390.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1401014694.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1401014694.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2053697443.0000000002280000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2053697443.0000000002280000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2053408103.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2053408103.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:9
                                            Start time:15:11:36
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\eIZi481eP6.dll",PlayGame
                                            Imagebase:0x920000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:10
                                            Start time:15:11:36
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvr.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvr.exe
                                            Imagebase:0x400000
                                            File size:2'281'472 bytes
                                            MD5 hash:E5CFF35706AB7BDAFA5F00F6FAD7058D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.1417194747.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.1417356799.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1417356799.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.1403754476.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.1403921673.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1403921673.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:71.8%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:64.9%
                                              Total number of Nodes:37
                                              Total number of Limit Nodes:9

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                              • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                              • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                              • CreateProcessA.KERNELBASE ref: 00407EE8
                                              • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                              • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1416155723.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1416138183.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416179744.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416253807.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4281112323-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1416155723.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1416138183.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416179744.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416253807.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1416155723.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1416138183.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416179744.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416253807.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              • API String ID: 774561529-2614457033
                                              • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                              • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1416155723.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1416138183.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416179744.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416253807.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                              • API String ID: 3340711343-2450984573
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.1416155723.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.1416138183.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416179744.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416196802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416253807.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.1416348768.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.1
                                              • API String ID: 4274534310-2839763450
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Execution Graph

                                              Execution Coverage:34.9%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:35
                                              Total number of Limit Nodes:2

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2052486731.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2052471310.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052505409.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052587749.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052608493.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.1
                                              • API String ID: 4274534310-2839763450
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2052486731.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2052471310.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052505409.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052587749.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052608493.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              • API String ID: 774561529-2614457033
                                              • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                              • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                              • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2052486731.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2052471310.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052505409.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052587749.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052608493.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                              • API String ID: 3340711343-2450984573
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2052486731.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2052471310.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052505409.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052587749.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052608493.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4072214828-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2052486731.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2052471310.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052505409.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052523055.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052570088.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052587749.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052608493.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.000000000084D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000008.00000002.2052693488.00000000008C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59