Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
F1G5BkUV74.dll

Overview

General Information

Sample name:F1G5BkUV74.dll
renamed because original name is a hash value
Original sample name:bdcaf7ef34cd9b02932e5ee2297e4893.dll
Analysis ID:1591377
MD5:bdcaf7ef34cd9b02932e5ee2297e4893
SHA1:0a29bcc5c829e276d06ea92919de2740b938691c
SHA256:8d0c9d2e438f33dd7806ed8017baa1f114b6157f9f0eb1fb5d3b59351609120c
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4288 cmdline: loaddll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2520 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 428 cmdline: rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1492 cmdline: rundll32.exe C:\Users\user\Desktop\F1G5BkUV74.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 1856 cmdline: C:\WINDOWS\mssecsvr.exe MD5: B6FB8BD123BD0C46CC1A17A2775569B5)
    • rundll32.exe (PID: 6004 cmdline: rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 4308 cmdline: C:\WINDOWS\mssecsvr.exe MD5: B6FB8BD123BD0C46CC1A17A2775569B5)
  • mssecsvr.exe (PID: 6448 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: B6FB8BD123BD0C46CC1A17A2775569B5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
F1G5BkUV74.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    F1G5BkUV74.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    F1G5BkUV74.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000009.00000002.2180600297.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000009.00000000.2166423022.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000006.00000000.2138325687.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                7.2.mssecsvr.exe.1d52084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                7.2.mssecsvr.exe.227a8c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                6.2.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                6.2.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                9.2.mssecsvr.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                  Click to see the 87 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T23:01:14.297678+010028033043Unknown Traffic192.168.2.549705103.224.212.21580TCP
                  2025-01-14T23:01:16.150079+010028033043Unknown Traffic192.168.2.549707103.224.212.21580TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T23:01:13.372632+010028300181A Network Trojan was detected192.168.2.5576191.1.1.153UDP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: F1G5BkUV74.dllAvira: detected
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30f7fAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30fAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c751956Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68dAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68d38Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c7519Avira URL Cloud: Label: malware
                  Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 93%
                  Source: C:\Windows\tasksche.exeReversingLabs: Detection: 93%
                  Source: F1G5BkUV74.dllReversingLabs: Detection: 95%
                  Source: F1G5BkUV74.dllVirustotal: Detection: 94%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
                  Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                  Source: F1G5BkUV74.dllJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: F1G5BkUV74.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.5:57619 -> 1.1.1.1:53
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-14d8-ae64-02e71c751956 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736892074.7770901
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-1669-a0d3-4edd9cd30f7f HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-1690-be53-cf6353b68d38 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=4d94cd22-7172-4f4b-ac4b-b562938e91cd
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49707 -> 103.224.212.215:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49705 -> 103.224.212.215:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.241
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.241
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.241
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.241
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.26
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.26
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.26
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.26
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 131.73.187.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.3
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.3
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.3
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.3
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 200.56.125.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.125.28.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 33.35.197.143
                  Source: unknownTCP traffic detected without corresponding DNS query: 33.35.197.143
                  Source: unknownTCP traffic detected without corresponding DNS query: 33.35.197.143
                  Source: unknownTCP traffic detected without corresponding DNS query: 33.35.197.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-14d8-ae64-02e71c751956 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736892074.7770901
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-1669-a0d3-4edd9cd30f7f HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-1690-be53-cf6353b68d38 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=4d94cd22-7172-4f4b-ac4b-b562938e91cd
                  Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.00000000009C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.J
                  Source: mssecsvr.exe, 00000009.00000002.2181275344.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.000000000099E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c7519
                  Source: mssecsvr.exe, 00000007.00000002.2810897933.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30f
                  Source: mssecsvr.exe, 00000009.00000002.2181275344.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000003.2179176871.0000000000A7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68d
                  Source: mssecsvr.exe, 00000007.00000002.2810897933.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9igh
                  Source: F1G5BkUV74.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.000000000095E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2173964815.000000000099E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2810897933.0000000000C1A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2181275344.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2181275344.0000000000A18000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2181275344.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                  Source: mssecsvr.exe, 00000007.00000002.2810897933.0000000000C1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/i
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.000000000095E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/m
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.000000000095E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com1
                  Source: mssecsvr.exe, 00000007.00000002.2810089396.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: F1G5BkUV74.dll, type: SAMPLE
                  Source: Yara matchFile source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.22ac96c.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.227a8c8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.1d84128.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.1d52084.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.1d61104.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.22858e8.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.1d5d0a4.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.mssecsvr.exe.2289948.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.2180600297.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.2166423022.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.2138325687.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000000.2159921750.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.2138475485.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2180869415.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000000.2160091492.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.2166574192.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2811407590.0000000001D61000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2811667868.0000000002289000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 1856, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6448, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 4308, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: F1G5BkUV74.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: F1G5BkUV74.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d52084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.227a8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.22ac96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.22ac96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.22ac96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.22ac96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d84128.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.1d84128.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.227a8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.227a8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d84128.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.1d84128.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d52084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.1d52084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d61104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.1d61104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.22858e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.22858e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.1d5d0a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.1d5d0a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 7.2.mssecsvr.exe.2289948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 7.2.mssecsvr.exe.2289948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000000.2138475485.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000009.00000002.2180869415.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000007.00000000.2160091492.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000009.00000000.2166574192.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000007.00000002.2811407590.0000000001D61000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000007.00000002.2811667868.0000000002289000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: tasksche.exe.6.drStatic PE information: No import functions for PE file found
                  Source: F1G5BkUV74.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: F1G5BkUV74.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: F1G5BkUV74.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d52084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.227a8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.22ac96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.22ac96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.22ac96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.22ac96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d84128.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.1d84128.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 7.2.mssecsvr.exe.2289948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.227a8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.227a8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d84128.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.1d84128.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 7.2.mssecsvr.exe.1d61104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d52084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.1d52084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d61104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.1d61104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.22858e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.22858e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.1d5d0a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.1d5d0a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 7.2.mssecsvr.exe.2289948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 7.2.mssecsvr.exe.2289948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000000.2138475485.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000009.00000002.2180869415.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000007.00000000.2160091492.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000009.00000000.2166574192.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000007.00000002.2811407590.0000000001D61000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000007.00000002.2811667868.0000000002289000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: tasksche.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: tasksche.exe.6.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                  Source: tasksche.exe.6.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                  Source: tasksche.exe.6.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                  Source: F1G5BkUV74.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                  Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                  Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                  Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                  Source: C:\Windows\mssecsvr.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3276:120:WilError_03
                  Source: F1G5BkUV74.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F1G5BkUV74.dll,PlayGame
                  Source: F1G5BkUV74.dllReversingLabs: Detection: 95%
                  Source: F1G5BkUV74.dllVirustotal: Detection: 94%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F1G5BkUV74.dll,PlayGame
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                  Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",PlayGame
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F1G5BkUV74.dll,PlayGameJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",PlayGameJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1Jump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: F1G5BkUV74.dllStatic file information: File size 5267459 > 1048576
                  Source: F1G5BkUV74.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                  Source: tasksche.exe.6.drStatic PE information: section name: .text entropy: 7.64063717569669

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exe TID: 1088Thread sleep count: 94 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 1088Thread sleep time: -188000s >= -30000sJump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 4196Thread sleep count: 127 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 4196Thread sleep count: 40 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 1088Thread sleep time: -86400000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                  Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: mssecsvr.exe, 00000009.00000002.2181275344.0000000000A3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp+
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.00000000009C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn*
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.000000000095E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(W
                  Source: mssecsvr.exe, 00000006.00000002.2173964815.00000000009C5000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2810897933.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2810897933.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2181275344.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1Jump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Service Execution
                  4
                  Windows Service
                  4
                  Windows Service
                  12
                  Masquerading
                  OS Credential Dumping1
                  Network Share Discovery
                  Remote ServicesData from Local System2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  11
                  Process Injection
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Obfuscated Files or Information
                  NTDS1
                  System Information Discovery
                  Distributed Component Object ModelInput Capture3
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Rundll32
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Software Packing
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591377 Sample: F1G5BkUV74.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 34 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->34 36 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 77026.bodis.com 2->38 46 Suricata IDS alerts for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for URL or domain 2->50 52 7 other signatures 2->52 8 loaddll32.exe 1 2->8         started        10 mssecsvr.exe 12 2->10         started        signatures3 process4 dnsIp5 14 rundll32.exe 8->14         started        17 rundll32.exe 8->17         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        40 192.168.2.102 unknown unknown 10->40 42 192.168.2.103 unknown unknown 10->42 44 98 other IPs or domains 10->44 54 Connects to many different private IPs via SMB (likely to spread or exploit) 10->54 56 Connects to many different private IPs (likely to spread or exploit) 10->56 signatures6 process7 signatures8 58 Drops executables to the windows directory (C:\Windows) and starts them 14->58 23 mssecsvr.exe 13 14->23         started        26 mssecsvr.exe 13 17->26         started        28 rundll32.exe 1 19->28         started        process9 file10 30 C:\WINDOWS\qeriuwjhrf (copy), PE32 23->30 dropped 32 C:\Windows\tasksche.exe, PE32 26->32 dropped

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  F1G5BkUV74.dll95%ReversingLabsWin32.Ransomware.WannaCry
                  F1G5BkUV74.dll94%VirustotalBrowse
                  F1G5BkUV74.dll100%AviraTR/AD.WannaCry.zlvlj
                  F1G5BkUV74.dll100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Windows\tasksche.exe100%Joe Sandbox ML
                  C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30f7f100%Avira URL Cloudmalware
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com10%Avira URL Cloudsafe
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30f100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c751956100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68d100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9igh0%Avira URL Cloudsafe
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68d38100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c7519100%Avira URL Cloudmalware
                  http://ww25.J0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  77026.bodis.com
                  199.59.243.228
                  truefalse
                    high
                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    103.224.212.215
                    truefalse
                      high
                      ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c751956false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30f7ffalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                          high
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68d38false
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mmssecsvr.exe, 00000006.00000002.2173964815.000000000095E000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68dmssecsvr.exe, 00000009.00000002.2181275344.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000003.2179176871.0000000000A7A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/imssecsvr.exe, 00000007.00000002.2810897933.0000000000C1A000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comF1G5BkUV74.dllfalse
                                high
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30fmssecsvr.exe, 00000007.00000002.2810897933.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com1mssecsvr.exe, 00000006.00000002.2173964815.000000000095E000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c7519mssecsvr.exe, 00000006.00000002.2173964815.000000000099E000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000007.00000002.2810089396.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.Jmssecsvr.exe, 00000006.00000002.2173964815.00000000009C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwmssecsvr.exe, 00000009.00000002.2181275344.0000000000A4D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://ww25.iuqerfsodp9ighmssecsvr.exe, 00000007.00000002.2810897933.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  33.175.236.1
                                  unknownUnited States
                                  2686ATGS-MMD-ASUSfalse
                                  165.165.9.166
                                  unknownSouth Africa
                                  5713SAIX-NETZAfalse
                                  96.221.78.1
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  96.221.78.64
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  31.38.176.245
                                  unknownFrance
                                  5410BOUYGTEL-ISPFRfalse
                                  175.107.76.1
                                  unknownKorea Republic of
                                  9765VTOPIA-AS-KRVTOPIAKRfalse
                                  31.38.176.1
                                  unknownFrance
                                  5410BOUYGTEL-ISPFRfalse
                                  155.32.24.1
                                  unknownNew Zealand
                                  24324KORDIA-TRANSIT-AS-APKordiaLimitedNZfalse
                                  33.131.241.1
                                  unknownUnited States
                                  2686ATGS-MMD-ASUSfalse
                                  210.238.136.228
                                  unknownJapan2516KDDIKDDICORPORATIONJPfalse
                                  178.11.135.1
                                  unknownGermany
                                  3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                  178.11.135.2
                                  unknownGermany
                                  3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                  106.52.131.1
                                  unknownChina
                                  45090CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompafalse
                                  33.175.236.126
                                  unknownUnited States
                                  2686ATGS-MMD-ASUSfalse
                                  27.239.87.188
                                  unknownKorea Republic of
                                  4766KIXS-AS-KRKoreaTelecomKRfalse
                                  135.45.113.1
                                  unknownUnited States
                                  54614CIKTELECOM-CABLECAfalse
                                  206.38.36.217
                                  unknownUnited States
                                  721DNIC-ASBLK-00721-00726USfalse
                                  66.125.28.241
                                  unknownUnited States
                                  7132SBIS-ASUSfalse
                                  206.38.36.1
                                  unknownUnited States
                                  721DNIC-ASBLK-00721-00726USfalse
                                  170.188.75.1
                                  unknownUnited States
                                  47090SCLHS-47090USfalse
                                  178.11.135.196
                                  unknownGermany
                                  3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                  135.45.113.250
                                  unknownUnited States
                                  54614CIKTELECOM-CABLECAfalse
                                  155.32.24.154
                                  unknownNew Zealand
                                  24324KORDIA-TRANSIT-AS-APKordiaLimitedNZfalse
                                  131.73.187.2
                                  unknownUnited States
                                  28075ARLINKSAARfalse
                                  131.73.187.1
                                  unknownUnited States
                                  28075ARLINKSAARfalse
                                  IP
                                  192.168.2.148
                                  192.168.2.149
                                  192.168.2.146
                                  192.168.2.147
                                  192.168.2.140
                                  192.168.2.141
                                  192.168.2.144
                                  192.168.2.145
                                  192.168.2.142
                                  192.168.2.143
                                  192.168.2.159
                                  192.168.2.157
                                  192.168.2.158
                                  192.168.2.151
                                  192.168.2.152
                                  192.168.2.150
                                  192.168.2.155
                                  192.168.2.156
                                  192.168.2.153
                                  192.168.2.154
                                  192.168.2.126
                                  192.168.2.247
                                  192.168.2.127
                                  192.168.2.248
                                  192.168.2.124
                                  192.168.2.245
                                  192.168.2.125
                                  192.168.2.246
                                  192.168.2.128
                                  192.168.2.249
                                  192.168.2.129
                                  192.168.2.240
                                  192.168.2.122
                                  192.168.2.243
                                  192.168.2.123
                                  192.168.2.244
                                  192.168.2.120
                                  192.168.2.241
                                  192.168.2.121
                                  192.168.2.242
                                  192.168.2.97
                                  192.168.2.137
                                  192.168.2.96
                                  192.168.2.138
                                  192.168.2.99
                                  192.168.2.135
                                  192.168.2.98
                                  192.168.2.136
                                  192.168.2.139
                                  192.168.2.250
                                  192.168.2.130
                                  192.168.2.251
                                  192.168.2.91
                                  192.168.2.90
                                  192.168.2.93
                                  192.168.2.133
                                  192.168.2.254
                                  192.168.2.92
                                  192.168.2.134
                                  192.168.2.95
                                  192.168.2.131
                                  192.168.2.252
                                  192.168.2.94
                                  192.168.2.132
                                  192.168.2.253
                                  192.168.2.104
                                  192.168.2.225
                                  192.168.2.105
                                  192.168.2.226
                                  192.168.2.102
                                  192.168.2.223
                                  192.168.2.103
                                  192.168.2.224
                                  192.168.2.108
                                  192.168.2.229
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1591377
                                  Start date and time:2025-01-14 23:00:12 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 27s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:12
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:F1G5BkUV74.dll
                                  renamed because original name is a hash value
                                  Original Sample Name:bdcaf7ef34cd9b02932e5ee2297e4893.dll
                                  Detection:MAL
                                  Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .dll
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 199.232.210.172, 2.23.77.188, 13.107.246.45, 4.175.87.197
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  17:01:15API Interceptor1x Sleep call for process: loaddll32.exe modified
                                  17:01:50API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  77026.bodis.comhabHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                  • 199.59.243.228
                                  8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                  • 199.59.243.227
                                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comsLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                  • 103.224.212.215
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SAIX-NETZAsLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                  • 102.252.16.166
                                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                  • 102.252.75.222
                                  meth10.elfGet hashmaliciousMiraiBrowse
                                  • 41.198.64.136
                                  meth2.elfGet hashmaliciousMiraiBrowse
                                  • 41.146.97.251
                                  meth15.elfGet hashmaliciousMiraiBrowse
                                  • 41.149.215.18
                                  elitebotnet.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 102.248.204.132
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 41.246.80.204
                                  4.elfGet hashmaliciousUnknownBrowse
                                  • 41.149.186.133
                                  5.elfGet hashmaliciousUnknownBrowse
                                  • 41.151.3.237
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 41.145.255.153
                                  COMCAST-7922US19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                  • 75.65.143.1
                                  YZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                                  • 29.248.211.36
                                  87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                  • 26.28.204.104
                                  Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                  • 26.34.166.1
                                  9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                  • 73.80.3.78
                                  6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                  • 28.125.169.1
                                  MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                  • 73.191.198.1
                                  mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                  • 26.20.34.202
                                  jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                  • 75.149.106.1
                                  Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                  • 68.43.54.12
                                  ATGS-MMD-ASUSruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                  • 56.59.202.1
                                  YZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                                  • 51.209.245.1
                                  http://monitor.linkwhat.com/tl4tl4726Qz107cK770xR10599lj360px17lb07468gl70015oV95328Kn41253VG39381FP5605427918==aru2826664Get hashmaliciousPhisherBrowse
                                  • 34.149.158.220
                                  hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                  • 34.1.98.1
                                  FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
                                  • 51.243.90.42
                                  m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                  • 34.177.88.1
                                  5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                  • 48.82.13.223
                                  jpXNd6Kt8z.dllGet hashmaliciousWannacryBrowse
                                  • 33.222.99.200
                                  527.zipGet hashmaliciousUnknownBrowse
                                  • 34.160.144.191
                                  527.zipGet hashmaliciousUnknownBrowse
                                  • 34.160.144.191
                                  No context
                                  No context
                                  Process:C:\Windows\mssecsvr.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2061938
                                  Entropy (8bit):5.811132078708732
                                  Encrypted:false
                                  SSDEEP:24576:tihdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz66:9MSPbcBVQej/1INR
                                  MD5:B64550EA55F2ED6EE168FF79C40B56F8
                                  SHA1:41D6BD8747FFFA273065C3D5656A36F197718BB9
                                  SHA-256:DC25DFEB633EB5112BCDF1336088EE8D67EE81F6129BF9AB77287B13CE13BE32
                                  SHA-512:D2C34AC6056240F699174EBB6DCA7B1ABF98785E240AE1A6421026091ED08D6CC1CF0560E41A1A04F0E1F29C17E925956E840A38FCF64C4610A6DE84D49D22A8
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 93%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\mssecsvr.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2061938
                                  Entropy (8bit):5.811132078708732
                                  Encrypted:false
                                  SSDEEP:24576:tihdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz66:9MSPbcBVQej/1INR
                                  MD5:B64550EA55F2ED6EE168FF79C40B56F8
                                  SHA1:41D6BD8747FFFA273065C3D5656A36F197718BB9
                                  SHA-256:DC25DFEB633EB5112BCDF1336088EE8D67EE81F6129BF9AB77287B13CE13BE32
                                  SHA-512:D2C34AC6056240F699174EBB6DCA7B1ABF98785E240AE1A6421026091ED08D6CC1CF0560E41A1A04F0E1F29C17E925956E840A38FCF64C4610A6DE84D49D22A8
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 93%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):2.95934659514823
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                  • DOS Executable Generic (2002/1) 0.20%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:F1G5BkUV74.dll
                                  File size:5'267'459 bytes
                                  MD5:bdcaf7ef34cd9b02932e5ee2297e4893
                                  SHA1:0a29bcc5c829e276d06ea92919de2740b938691c
                                  SHA256:8d0c9d2e438f33dd7806ed8017baa1f114b6157f9f0eb1fb5d3b59351609120c
                                  SHA512:8c0fbf6444aee59f47ab4f6f9c0f0182db3c332c35725a32757055bdc522ef8e192f7ca2fbe7fe080c3a12090030e58bdce179fe0c2b2d0eeaa387c7c5aba81d
                                  SSDEEP:24576:RbLgurihdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz66:RnnMSPbcBVQej/1INR
                                  TLSH:273623DA35AC91FCD206367194778E22E6F73C6D31B9AA0F9B804A311C03B95BB54F52
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                  Icon Hash:7ae282899bbab082
                                  Entrypoint:0x100011e9
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x10000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                  DLL Characteristics:
                                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push ebx
                                  mov ebx, dword ptr [ebp+08h]
                                  push esi
                                  mov esi, dword ptr [ebp+0Ch]
                                  push edi
                                  mov edi, dword ptr [ebp+10h]
                                  test esi, esi
                                  jne 00007F0D50E8D34Bh
                                  cmp dword ptr [10003140h], 00000000h
                                  jmp 00007F0D50E8D368h
                                  cmp esi, 01h
                                  je 00007F0D50E8D347h
                                  cmp esi, 02h
                                  jne 00007F0D50E8D364h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007F0D50E8D34Bh
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  test eax, eax
                                  je 00007F0D50E8D34Eh
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F0D50E8D25Ah
                                  test eax, eax
                                  jne 00007F0D50E8D346h
                                  xor eax, eax
                                  jmp 00007F0D50E8D390h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F0D50E8D10Ch
                                  cmp esi, 01h
                                  mov dword ptr [ebp+0Ch], eax
                                  jne 00007F0D50E8D34Eh
                                  test eax, eax
                                  jne 00007F0D50E8D379h
                                  push edi
                                  push eax
                                  push ebx
                                  call 00007F0D50E8D236h
                                  test esi, esi
                                  je 00007F0D50E8D347h
                                  cmp esi, 03h
                                  jne 00007F0D50E8D368h
                                  push edi
                                  push esi
                                  push ebx
                                  call 00007F0D50E8D225h
                                  test eax, eax
                                  jne 00007F0D50E8D345h
                                  and dword ptr [ebp+0Ch], eax
                                  cmp dword ptr [ebp+0Ch], 00000000h
                                  je 00007F0D50E8D353h
                                  mov eax, dword ptr [10003150h]
                                  test eax, eax
                                  je 00007F0D50E8D34Ah
                                  push edi
                                  push esi
                                  push ebx
                                  call eax
                                  mov dword ptr [ebp+0Ch], eax
                                  mov eax, dword ptr [ebp+0Ch]
                                  pop edi
                                  pop esi
                                  pop ebx
                                  pop ebp
                                  retn 000Ch
                                  jmp dword ptr [10002028h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  Programming Language:
                                  • [ C ] VS98 (6.0) build 8168
                                  • [C++] VS98 (6.0) build 8168
                                  • [RES] VS98 (6.0) cvtres build 1720
                                  • [LNK] VS98 (6.0) imp/exp build 8168
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x40000x5000600x501000c8d4f37730504a4c996658dc08ba80aeunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  W0x40600x500000dataEnglishUnited States0.8791799545288086
                                  DLLImport
                                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                  NameOrdinalAddress
                                  PlayGame10x10001114
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-14T23:01:13.372632+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.5576191.1.1.153UDP
                                  2025-01-14T23:01:14.297678+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549705103.224.212.21580TCP
                                  2025-01-14T23:01:16.150079+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549707103.224.212.21580TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 14, 2025 23:01:08.588259935 CET49675443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:08.588356972 CET49674443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:08.713319063 CET49673443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:13.681046009 CET4970580192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:13.685864925 CET8049705103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:13.686577082 CET4970580192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:13.686799049 CET4970580192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:13.691556931 CET8049705103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:14.297621012 CET8049705103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:14.297677994 CET4970580192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:14.297697067 CET8049705103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:14.297744036 CET4970580192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:14.301779032 CET4970580192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:14.306664944 CET8049705103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:14.688163996 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:14.692964077 CET8049706199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:14.693063974 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:14.693592072 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:14.698342085 CET8049706199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:15.147213936 CET8049706199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:15.147239923 CET8049706199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:15.147322893 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:15.147357941 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:15.244940042 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:15.244976997 CET4970680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:15.553031921 CET4970780192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:15.557960033 CET8049707103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:15.558047056 CET4970780192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:15.565308094 CET4970780192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:15.570069075 CET8049707103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.150002003 CET8049707103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.150019884 CET8049707103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.150079012 CET4970780192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.160332918 CET4970780192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.160367012 CET4970880192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.161606073 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.165219069 CET8049707103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.165241957 CET8049708103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.165358067 CET4970880192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.165612936 CET4970880192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.166467905 CET8049709199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:16.166579962 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.166739941 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.170408010 CET8049708103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.171578884 CET8049709199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:16.636703968 CET8049709199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:16.636728048 CET8049709199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:16.636766911 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.636795998 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.644057035 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.644088030 CET4970980192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.699904919 CET49710445192.168.2.5210.238.136.228
                                  Jan 14, 2025 23:01:16.705384970 CET44549710210.238.136.228192.168.2.5
                                  Jan 14, 2025 23:01:16.705477953 CET49710445192.168.2.5210.238.136.228
                                  Jan 14, 2025 23:01:16.705543995 CET49710445192.168.2.5210.238.136.228
                                  Jan 14, 2025 23:01:16.705734968 CET49711445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.711816072 CET44549710210.238.136.228192.168.2.5
                                  Jan 14, 2025 23:01:16.711848974 CET44549711210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:16.711872101 CET49710445192.168.2.5210.238.136.228
                                  Jan 14, 2025 23:01:16.711925983 CET49711445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.712490082 CET49711445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.717299938 CET44549711210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:16.717350960 CET49711445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.721775055 CET49712445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.726613998 CET44549712210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:16.726706028 CET49712445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.726802111 CET49712445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:16.731587887 CET44549712210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:16.813292980 CET8049708103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.813407898 CET4970880192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.813519955 CET8049708103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.813646078 CET4970880192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.818938971 CET4970880192.168.2.5103.224.212.215
                                  Jan 14, 2025 23:01:16.820885897 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.824028969 CET8049708103.224.212.215192.168.2.5
                                  Jan 14, 2025 23:01:16.825824976 CET8049716199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:16.825891972 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.826224089 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:16.831026077 CET8049716199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:17.306843042 CET8049716199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:17.306930065 CET8049716199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:17.306931019 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:17.306976080 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:17.314990044 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:17.315088987 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:17.320075989 CET8049716199.59.243.228192.168.2.5
                                  Jan 14, 2025 23:01:17.320162058 CET4971680192.168.2.5199.59.243.228
                                  Jan 14, 2025 23:01:18.197885036 CET49674443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:18.197999001 CET49675443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:18.322933912 CET49673443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:18.683810949 CET49736445192.168.2.566.125.28.241
                                  Jan 14, 2025 23:01:18.688671112 CET4454973666.125.28.241192.168.2.5
                                  Jan 14, 2025 23:01:18.688859940 CET49736445192.168.2.566.125.28.241
                                  Jan 14, 2025 23:01:18.688859940 CET49736445192.168.2.566.125.28.241
                                  Jan 14, 2025 23:01:18.688994884 CET49737445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.696424961 CET4454973766.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:18.696532011 CET4454973666.125.28.241192.168.2.5
                                  Jan 14, 2025 23:01:18.696568966 CET49737445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.696609974 CET49736445192.168.2.566.125.28.241
                                  Jan 14, 2025 23:01:18.696772099 CET49737445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.698359966 CET49738445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.701776981 CET4454973766.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:18.702006102 CET49737445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.703121901 CET4454973866.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:18.703196049 CET49738445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.703288078 CET49738445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:18.710486889 CET4454973866.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:20.056835890 CET4434970323.1.237.91192.168.2.5
                                  Jan 14, 2025 23:01:20.056952000 CET49703443192.168.2.523.1.237.91
                                  Jan 14, 2025 23:01:20.487293959 CET4454973866.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:20.487529993 CET49738445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:20.500900984 CET49738445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:20.500994921 CET49738445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:20.505726099 CET4454973866.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:20.505788088 CET4454973866.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:21.823281050 CET49779445192.168.2.5131.73.187.26
                                  Jan 14, 2025 23:01:21.828083038 CET44549779131.73.187.26192.168.2.5
                                  Jan 14, 2025 23:01:21.828165054 CET49779445192.168.2.5131.73.187.26
                                  Jan 14, 2025 23:01:21.834872007 CET49779445192.168.2.5131.73.187.26
                                  Jan 14, 2025 23:01:21.835161924 CET49780445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.839741945 CET44549779131.73.187.26192.168.2.5
                                  Jan 14, 2025 23:01:21.839802980 CET49779445192.168.2.5131.73.187.26
                                  Jan 14, 2025 23:01:21.839993954 CET44549780131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:21.840122938 CET49780445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.840122938 CET49780445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.841134071 CET49781445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.845104933 CET44549780131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:21.845165014 CET49780445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.845911026 CET44549781131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:21.845985889 CET49781445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.846024036 CET49781445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:21.850740910 CET44549781131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:22.715117931 CET49796445192.168.2.5200.56.125.3
                                  Jan 14, 2025 23:01:22.720042944 CET44549796200.56.125.3192.168.2.5
                                  Jan 14, 2025 23:01:22.720132113 CET49796445192.168.2.5200.56.125.3
                                  Jan 14, 2025 23:01:22.720175982 CET49796445192.168.2.5200.56.125.3
                                  Jan 14, 2025 23:01:22.720458031 CET49797445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.725712061 CET44549796200.56.125.3192.168.2.5
                                  Jan 14, 2025 23:01:22.725744963 CET44549797200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:22.725794077 CET49796445192.168.2.5200.56.125.3
                                  Jan 14, 2025 23:01:22.725851059 CET49797445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.725902081 CET49797445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.727055073 CET49798445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.733071089 CET44549797200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:22.733103991 CET44549798200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:22.733129025 CET49797445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.733179092 CET49798445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.733321905 CET49798445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:22.738172054 CET44549798200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:23.528922081 CET49810445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:23.533881903 CET4454981066.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:23.533987999 CET49810445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:23.534868002 CET49810445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:23.539663076 CET4454981066.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:24.731405973 CET49828445192.168.2.533.35.197.143
                                  Jan 14, 2025 23:01:24.736603022 CET4454982833.35.197.143192.168.2.5
                                  Jan 14, 2025 23:01:24.736840963 CET49828445192.168.2.533.35.197.143
                                  Jan 14, 2025 23:01:24.737003088 CET49828445192.168.2.533.35.197.143
                                  Jan 14, 2025 23:01:24.737353086 CET49829445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.741842031 CET4454982833.35.197.143192.168.2.5
                                  Jan 14, 2025 23:01:24.741919041 CET49828445192.168.2.533.35.197.143
                                  Jan 14, 2025 23:01:24.742261887 CET4454982933.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:24.742371082 CET49829445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.742461920 CET49829445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.743416071 CET49830445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.747407913 CET4454982933.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:24.747514009 CET49829445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.748218060 CET4454983033.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:24.748300076 CET49830445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.748354912 CET49830445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:24.753313065 CET4454983033.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:25.167449951 CET4454981066.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:25.167561054 CET49810445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:25.167654991 CET49810445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:25.167655945 CET49810445192.168.2.566.125.28.1
                                  Jan 14, 2025 23:01:25.172476053 CET4454981066.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:25.172491074 CET4454981066.125.28.1192.168.2.5
                                  Jan 14, 2025 23:01:25.229738951 CET49842445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.234630108 CET4454984266.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:25.236973047 CET49842445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.237056017 CET49842445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.238234043 CET49844445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.242000103 CET4454984266.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:25.242085934 CET49842445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.243128061 CET4454984466.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:25.243216038 CET49844445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.243258953 CET49844445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:25.247982025 CET4454984466.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:26.746562958 CET49870445192.168.2.5197.4.5.170
                                  Jan 14, 2025 23:01:26.751430988 CET44549870197.4.5.170192.168.2.5
                                  Jan 14, 2025 23:01:26.751514912 CET49870445192.168.2.5197.4.5.170
                                  Jan 14, 2025 23:01:26.751569986 CET49870445192.168.2.5197.4.5.170
                                  Jan 14, 2025 23:01:26.751837969 CET49871445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.756434917 CET44549870197.4.5.170192.168.2.5
                                  Jan 14, 2025 23:01:26.756498098 CET49870445192.168.2.5197.4.5.170
                                  Jan 14, 2025 23:01:26.756702900 CET44549871197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:26.756778955 CET49871445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.756860018 CET49871445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.758172989 CET49872445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.761785030 CET44549871197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:26.761859894 CET49871445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.763078928 CET44549872197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:26.763153076 CET49872445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.763253927 CET49872445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:26.768007040 CET44549872197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:28.804555893 CET49907445192.168.2.5192.75.238.7
                                  Jan 14, 2025 23:01:28.809381962 CET44549907192.75.238.7192.168.2.5
                                  Jan 14, 2025 23:01:28.809830904 CET49907445192.168.2.5192.75.238.7
                                  Jan 14, 2025 23:01:28.809887886 CET49907445192.168.2.5192.75.238.7
                                  Jan 14, 2025 23:01:28.810034037 CET49909445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.814908028 CET44549909192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:28.815015078 CET44549907192.75.238.7192.168.2.5
                                  Jan 14, 2025 23:01:28.815095901 CET49907445192.168.2.5192.75.238.7
                                  Jan 14, 2025 23:01:28.815625906 CET49909445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.865355968 CET49909445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.870420933 CET44549909192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:28.870569944 CET49909445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.871726036 CET49913445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.876560926 CET44549913192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:28.876641035 CET49913445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.876709938 CET49913445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:28.881453991 CET44549913192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:29.101213932 CET44549872197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:29.101270914 CET49872445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:29.104119062 CET49872445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:29.104171038 CET49872445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:29.108958960 CET44549872197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:29.108968973 CET44549872197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:30.792644978 CET49946445192.168.2.545.211.236.5
                                  Jan 14, 2025 23:01:30.797492027 CET4454994645.211.236.5192.168.2.5
                                  Jan 14, 2025 23:01:30.797604084 CET49946445192.168.2.545.211.236.5
                                  Jan 14, 2025 23:01:30.797636986 CET49946445192.168.2.545.211.236.5
                                  Jan 14, 2025 23:01:30.797748089 CET49947445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.802479029 CET4454994745.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:30.802530050 CET49947445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.802582979 CET49947445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.802817106 CET49948445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.804136038 CET4454994645.211.236.5192.168.2.5
                                  Jan 14, 2025 23:01:30.804316998 CET49946445192.168.2.545.211.236.5
                                  Jan 14, 2025 23:01:30.807585955 CET4454994845.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:30.807707071 CET49948445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.807725906 CET4454994745.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:30.807773113 CET49947445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.807921886 CET49948445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:30.812690973 CET4454994845.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:32.105052948 CET49970445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:32.109911919 CET44549970197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:32.110043049 CET49970445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:32.110043049 CET49970445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:32.114824057 CET44549970197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:32.808769941 CET49982445192.168.2.5178.11.135.196
                                  Jan 14, 2025 23:01:32.813534975 CET44549982178.11.135.196192.168.2.5
                                  Jan 14, 2025 23:01:32.813600063 CET49982445192.168.2.5178.11.135.196
                                  Jan 14, 2025 23:01:32.813651085 CET49982445192.168.2.5178.11.135.196
                                  Jan 14, 2025 23:01:32.813741922 CET49983445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.818458080 CET44549983178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:32.818522930 CET49983445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.818547010 CET49983445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.818792105 CET49984445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.819356918 CET44549982178.11.135.196192.168.2.5
                                  Jan 14, 2025 23:01:32.819451094 CET49982445192.168.2.5178.11.135.196
                                  Jan 14, 2025 23:01:32.823513985 CET44549984178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:32.823587894 CET49984445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.823587894 CET49984445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.823781013 CET44549983178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:32.823832035 CET49983445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:32.828860998 CET44549984178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:34.025023937 CET44549970197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:34.025106907 CET49970445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:34.025186062 CET49970445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:34.025258064 CET49970445192.168.2.5197.4.5.1
                                  Jan 14, 2025 23:01:34.029989004 CET44549970197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:34.030033112 CET44549970197.4.5.1192.168.2.5
                                  Jan 14, 2025 23:01:34.089616060 CET50009445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.094383001 CET44550009197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:34.094491005 CET50009445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.094531059 CET50009445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.094769001 CET50010445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.099431992 CET44550009197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:34.099487066 CET50009445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.099550962 CET44550010197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:34.099606991 CET50010445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.099637985 CET50010445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:34.104373932 CET44550010197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:34.824256897 CET50021445192.168.2.555.86.227.130
                                  Jan 14, 2025 23:01:34.829118967 CET4455002155.86.227.130192.168.2.5
                                  Jan 14, 2025 23:01:34.829184055 CET50021445192.168.2.555.86.227.130
                                  Jan 14, 2025 23:01:34.829256058 CET50021445192.168.2.555.86.227.130
                                  Jan 14, 2025 23:01:34.829478025 CET50022445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.834398031 CET4455002255.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:34.834465027 CET4455002155.86.227.130192.168.2.5
                                  Jan 14, 2025 23:01:34.834471941 CET50022445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.834523916 CET50022445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.834590912 CET50021445192.168.2.555.86.227.130
                                  Jan 14, 2025 23:01:34.835083961 CET50023445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.839560986 CET4455002255.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:34.839623928 CET50022445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.839943886 CET4455002355.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:34.840006113 CET50023445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.840039968 CET50023445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:34.844877958 CET4455002355.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:35.887275934 CET44550010197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:35.887361050 CET50010445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:35.887413025 CET50010445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:35.887413025 CET50010445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:35.892225981 CET44550010197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:35.892235041 CET44550010197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:36.840010881 CET50055445192.168.2.533.131.241.70
                                  Jan 14, 2025 23:01:36.844801903 CET4455005533.131.241.70192.168.2.5
                                  Jan 14, 2025 23:01:36.844872952 CET50055445192.168.2.533.131.241.70
                                  Jan 14, 2025 23:01:36.844873905 CET50055445192.168.2.533.131.241.70
                                  Jan 14, 2025 23:01:36.844988108 CET50057445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.849771976 CET4455005733.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:36.849847078 CET50057445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.849858999 CET50057445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.849863052 CET4455005533.131.241.70192.168.2.5
                                  Jan 14, 2025 23:01:36.849910021 CET50055445192.168.2.533.131.241.70
                                  Jan 14, 2025 23:01:36.850097895 CET50058445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.854757071 CET4455005733.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:36.854814053 CET4455005833.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:36.854931116 CET50057445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.854973078 CET50058445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.855021000 CET50058445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:36.859786034 CET4455005833.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:38.108531952 CET44549712210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:38.108649015 CET49712445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:38.108649015 CET49712445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:38.108810902 CET49712445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:38.113507032 CET44549712210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:38.113557100 CET44549712210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:38.855197906 CET50094445192.168.2.514.88.215.89
                                  Jan 14, 2025 23:01:38.861047029 CET4455009414.88.215.89192.168.2.5
                                  Jan 14, 2025 23:01:38.863451004 CET50094445192.168.2.514.88.215.89
                                  Jan 14, 2025 23:01:38.863451004 CET50094445192.168.2.514.88.215.89
                                  Jan 14, 2025 23:01:38.863626003 CET50095445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.868539095 CET4455009514.88.215.1192.168.2.5
                                  Jan 14, 2025 23:01:38.869479895 CET4455009414.88.215.89192.168.2.5
                                  Jan 14, 2025 23:01:38.869556904 CET50094445192.168.2.514.88.215.89
                                  Jan 14, 2025 23:01:38.869663954 CET50095445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.869663954 CET50095445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.869929075 CET50096445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.874716043 CET4455009514.88.215.1192.168.2.5
                                  Jan 14, 2025 23:01:38.874757051 CET4455009614.88.215.1192.168.2.5
                                  Jan 14, 2025 23:01:38.874860048 CET50095445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.874917030 CET50096445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.875355959 CET50096445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:01:38.880695105 CET4455009614.88.215.1192.168.2.5
                                  Jan 14, 2025 23:01:38.901874065 CET50097445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:38.906703949 CET44550097197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:38.906821966 CET50097445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:38.906821966 CET50097445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:38.911653042 CET44550097197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:40.849514008 CET44550097197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:40.849618912 CET50097445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:40.849618912 CET50097445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:40.849658012 CET50097445192.168.2.5197.4.5.2
                                  Jan 14, 2025 23:01:40.854474068 CET44550097197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:40.854485989 CET44550097197.4.5.2192.168.2.5
                                  Jan 14, 2025 23:01:40.871035099 CET50133445192.168.2.5135.45.113.250
                                  Jan 14, 2025 23:01:40.875840902 CET44550133135.45.113.250192.168.2.5
                                  Jan 14, 2025 23:01:40.875911951 CET50133445192.168.2.5135.45.113.250
                                  Jan 14, 2025 23:01:40.875927925 CET50133445192.168.2.5135.45.113.250
                                  Jan 14, 2025 23:01:40.875998020 CET50134445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.880810022 CET44550134135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:01:40.880876064 CET44550133135.45.113.250192.168.2.5
                                  Jan 14, 2025 23:01:40.880892992 CET50134445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.880892992 CET50134445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.881195068 CET50133445192.168.2.5135.45.113.250
                                  Jan 14, 2025 23:01:40.881222010 CET50135445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.885859013 CET44550134135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:01:40.885922909 CET50134445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.886039972 CET44550135135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:01:40.887475014 CET50135445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.887475014 CET50135445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:01:40.892293930 CET44550135135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:01:40.904120922 CET50136445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.908957958 CET44550136197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:01:40.911489964 CET50136445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.911503077 CET50136445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.911752939 CET50137445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.916712999 CET44550136197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:01:40.916786909 CET50136445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.916960955 CET44550137197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:01:40.917074919 CET50137445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.917074919 CET50137445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:01:40.921956062 CET44550137197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:01:41.120655060 CET50140445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:41.125540972 CET44550140210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:41.125710964 CET50140445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:41.125766993 CET50140445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:01:41.130644083 CET44550140210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:01:42.887996912 CET50156445192.168.2.5175.107.76.77
                                  Jan 14, 2025 23:01:42.892770052 CET44550156175.107.76.77192.168.2.5
                                  Jan 14, 2025 23:01:42.892873049 CET50156445192.168.2.5175.107.76.77
                                  Jan 14, 2025 23:01:42.893014908 CET50156445192.168.2.5175.107.76.77
                                  Jan 14, 2025 23:01:42.893203020 CET50157445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.898109913 CET44550157175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:01:42.898124933 CET44550156175.107.76.77192.168.2.5
                                  Jan 14, 2025 23:01:42.898196936 CET50157445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.898216009 CET50157445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.898221970 CET50156445192.168.2.5175.107.76.77
                                  Jan 14, 2025 23:01:42.898500919 CET50158445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.903173923 CET44550157175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:01:42.903261900 CET44550158175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:01:42.903268099 CET50157445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.903342009 CET50158445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.903383017 CET50158445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:01:42.908226967 CET44550158175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:01:43.219961882 CET44549781131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:43.220043898 CET49781445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:43.220113993 CET49781445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:43.220211983 CET49781445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:43.224934101 CET44549781131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:43.224972010 CET44549781131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:44.105079889 CET44549798200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:44.105340958 CET49798445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:44.105400085 CET49798445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:44.105458021 CET49798445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:44.110681057 CET44549798200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:44.110708952 CET44549798200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:44.902394056 CET50171445192.168.2.5170.188.75.102
                                  Jan 14, 2025 23:01:44.907912970 CET44550171170.188.75.102192.168.2.5
                                  Jan 14, 2025 23:01:44.907994986 CET50171445192.168.2.5170.188.75.102
                                  Jan 14, 2025 23:01:44.908056974 CET50171445192.168.2.5170.188.75.102
                                  Jan 14, 2025 23:01:44.908184052 CET50172445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.913101912 CET44550172170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:01:44.913160086 CET50172445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.913178921 CET50172445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.913381100 CET50173445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.913463116 CET44550171170.188.75.102192.168.2.5
                                  Jan 14, 2025 23:01:44.913517952 CET50171445192.168.2.5170.188.75.102
                                  Jan 14, 2025 23:01:44.918036938 CET44550172170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:01:44.918104887 CET50172445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.918143988 CET44550173170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:01:44.918200970 CET50173445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.918231010 CET50173445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:01:44.922986984 CET44550173170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:01:46.136440992 CET4454983033.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:46.136496067 CET49830445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:46.136568069 CET49830445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:46.136651039 CET49830445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:46.141784906 CET4454983033.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:46.141799927 CET4454983033.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:46.230319977 CET50181445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:46.235107899 CET44550181131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:46.235239983 CET50181445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:46.235336065 CET50181445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:01:46.240102053 CET44550181131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:01:46.655833960 CET4454984466.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:46.655961990 CET49844445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:46.656152964 CET49844445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:46.656187057 CET49844445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:46.661020041 CET4454984466.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:46.661040068 CET4454984466.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:46.918263912 CET50186445192.168.2.5192.117.193.148
                                  Jan 14, 2025 23:01:46.923053026 CET44550186192.117.193.148192.168.2.5
                                  Jan 14, 2025 23:01:46.923166990 CET50186445192.168.2.5192.117.193.148
                                  Jan 14, 2025 23:01:46.923196077 CET50186445192.168.2.5192.117.193.148
                                  Jan 14, 2025 23:01:46.923412085 CET50187445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.928212881 CET44550187192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:01:46.928297043 CET50187445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.928450108 CET44550186192.117.193.148192.168.2.5
                                  Jan 14, 2025 23:01:46.928479910 CET50187445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.928504944 CET50186445192.168.2.5192.117.193.148
                                  Jan 14, 2025 23:01:46.928852081 CET50188445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.933552027 CET44550187192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:01:46.933609009 CET50187445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.933670998 CET44550188192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:01:46.933772087 CET50188445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.933813095 CET50188445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:01:46.938569069 CET44550188192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:01:47.121089935 CET50190445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:47.125930071 CET44550190200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:47.126013041 CET50190445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:47.126072884 CET50190445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:01:47.130817890 CET44550190200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:01:48.934111118 CET50199445192.168.2.531.38.176.245
                                  Jan 14, 2025 23:01:48.939068079 CET4455019931.38.176.245192.168.2.5
                                  Jan 14, 2025 23:01:48.939579964 CET50199445192.168.2.531.38.176.245
                                  Jan 14, 2025 23:01:48.939625025 CET50199445192.168.2.531.38.176.245
                                  Jan 14, 2025 23:01:48.939853907 CET50200445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.944631100 CET4455019931.38.176.245192.168.2.5
                                  Jan 14, 2025 23:01:48.944641113 CET4455020031.38.176.1192.168.2.5
                                  Jan 14, 2025 23:01:48.944693089 CET50199445192.168.2.531.38.176.245
                                  Jan 14, 2025 23:01:48.944751978 CET50200445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.944806099 CET50200445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.945137978 CET50201445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.949760914 CET4455020031.38.176.1192.168.2.5
                                  Jan 14, 2025 23:01:48.949820995 CET50200445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.949907064 CET4455020131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:01:48.949975967 CET50201445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.950009108 CET50201445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:01:48.954896927 CET4455020131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:01:49.152343035 CET50204445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:49.157129049 CET4455020433.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:49.160079956 CET50204445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:49.160159111 CET50204445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:01:49.164860010 CET4455020433.35.197.1192.168.2.5
                                  Jan 14, 2025 23:01:49.667992115 CET50208445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:49.672907114 CET4455020866.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:49.672977924 CET50208445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:49.673095942 CET50208445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:01:49.678119898 CET4455020866.125.28.2192.168.2.5
                                  Jan 14, 2025 23:01:50.279207945 CET44549913192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:50.279320002 CET49913445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:50.279402018 CET49913445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:50.279450893 CET49913445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:50.284274101 CET44549913192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:50.284282923 CET44549913192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:50.949378014 CET50217445192.168.2.5124.128.75.210
                                  Jan 14, 2025 23:01:50.954287052 CET44550217124.128.75.210192.168.2.5
                                  Jan 14, 2025 23:01:50.954364061 CET50217445192.168.2.5124.128.75.210
                                  Jan 14, 2025 23:01:50.954443932 CET50217445192.168.2.5124.128.75.210
                                  Jan 14, 2025 23:01:50.954598904 CET50218445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.959350109 CET44550217124.128.75.210192.168.2.5
                                  Jan 14, 2025 23:01:50.959403992 CET44550218124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:01:50.959559917 CET50218445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.959616899 CET50218445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.959688902 CET50217445192.168.2.5124.128.75.210
                                  Jan 14, 2025 23:01:50.959909916 CET50219445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.964582920 CET44550218124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:01:50.964653969 CET50218445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.964744091 CET44550219124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:01:50.964812994 CET50219445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.964855909 CET50219445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:01:50.969595909 CET44550219124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:01:52.214817047 CET4454994845.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:52.214888096 CET49948445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:52.214972973 CET49948445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:52.215015888 CET49948445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:52.219799042 CET4454994845.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:52.219814062 CET4454994845.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:52.824867010 CET50231445192.168.2.5155.32.24.154
                                  Jan 14, 2025 23:01:52.829806089 CET44550231155.32.24.154192.168.2.5
                                  Jan 14, 2025 23:01:52.829900980 CET50231445192.168.2.5155.32.24.154
                                  Jan 14, 2025 23:01:52.829966068 CET50231445192.168.2.5155.32.24.154
                                  Jan 14, 2025 23:01:52.830082893 CET50232445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.834937096 CET44550232155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:01:52.834970951 CET44550231155.32.24.154192.168.2.5
                                  Jan 14, 2025 23:01:52.835021019 CET50232445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.835043907 CET50231445192.168.2.5155.32.24.154
                                  Jan 14, 2025 23:01:52.835114956 CET50232445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.835346937 CET50233445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.840476036 CET44550232155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:01:52.840533972 CET50232445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.840624094 CET44550233155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:01:52.840692043 CET50233445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.841878891 CET50233445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:01:52.846946955 CET44550233155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:01:53.326677084 CET50237445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:53.331506968 CET44550237192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:53.331955910 CET50237445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:53.336715937 CET50237445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:01:53.341495037 CET44550237192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:01:54.184247017 CET44549984178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:54.184370041 CET49984445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:54.184437037 CET49984445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:54.184437037 CET49984445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:54.189312935 CET44549984178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:54.189342976 CET44549984178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:54.575330973 CET50246445192.168.2.5206.34.209.148
                                  Jan 14, 2025 23:01:54.580147982 CET44550246206.34.209.148192.168.2.5
                                  Jan 14, 2025 23:01:54.580213070 CET50246445192.168.2.5206.34.209.148
                                  Jan 14, 2025 23:01:54.580532074 CET50246445192.168.2.5206.34.209.148
                                  Jan 14, 2025 23:01:54.580674887 CET50247445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.585403919 CET44550246206.34.209.148192.168.2.5
                                  Jan 14, 2025 23:01:54.585503101 CET44550247206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:01:54.585510969 CET50246445192.168.2.5206.34.209.148
                                  Jan 14, 2025 23:01:54.585567951 CET50247445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.585654974 CET50247445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.586144924 CET50248445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.591559887 CET44550248206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:01:54.591639996 CET50248445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.591846943 CET50248445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.592268944 CET44550247206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:01:54.592329979 CET50247445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:01:54.596645117 CET44550248206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:01:55.230706930 CET50253445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:55.235544920 CET4455025345.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:55.235622883 CET50253445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:55.235682964 CET50253445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:01:55.240498066 CET4455025345.211.236.1192.168.2.5
                                  Jan 14, 2025 23:01:56.201195002 CET4455002355.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:56.201399088 CET50023445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:56.201453924 CET50023445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:56.201493025 CET50023445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:56.206299067 CET4455002355.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:56.206307888 CET4455002355.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:56.215046883 CET50261445192.168.2.527.102.118.98
                                  Jan 14, 2025 23:01:56.219897985 CET4455026127.102.118.98192.168.2.5
                                  Jan 14, 2025 23:01:56.219959974 CET50261445192.168.2.527.102.118.98
                                  Jan 14, 2025 23:01:56.219979048 CET50261445192.168.2.527.102.118.98
                                  Jan 14, 2025 23:01:56.220061064 CET50262445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.224875927 CET4455026127.102.118.98192.168.2.5
                                  Jan 14, 2025 23:01:56.224930048 CET50261445192.168.2.527.102.118.98
                                  Jan 14, 2025 23:01:56.225790977 CET4455026227.102.118.1192.168.2.5
                                  Jan 14, 2025 23:01:56.225883007 CET50262445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.225950003 CET50262445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.226207018 CET50263445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.231821060 CET4455026327.102.118.1192.168.2.5
                                  Jan 14, 2025 23:01:56.231877089 CET4455026227.102.118.1192.168.2.5
                                  Jan 14, 2025 23:01:56.231914997 CET50263445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.231931925 CET50263445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.231997013 CET50262445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:01:56.237343073 CET4455026327.102.118.1192.168.2.5
                                  Jan 14, 2025 23:01:57.199369907 CET50270445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:57.204446077 CET44550270178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:57.204577923 CET50270445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:57.204621077 CET50270445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:01:57.209527969 CET44550270178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:01:57.746541977 CET50272445192.168.2.5138.229.112.140
                                  Jan 14, 2025 23:01:57.751456976 CET44550272138.229.112.140192.168.2.5
                                  Jan 14, 2025 23:01:57.751553059 CET50272445192.168.2.5138.229.112.140
                                  Jan 14, 2025 23:01:57.751624107 CET50272445192.168.2.5138.229.112.140
                                  Jan 14, 2025 23:01:57.751811028 CET50273445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.756557941 CET44550272138.229.112.140192.168.2.5
                                  Jan 14, 2025 23:01:57.756617069 CET50272445192.168.2.5138.229.112.140
                                  Jan 14, 2025 23:01:57.756629944 CET44550273138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:01:57.756685972 CET50273445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.756719112 CET50273445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.757030010 CET50275445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.761846066 CET44550275138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:01:57.761876106 CET44550273138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:01:57.761920929 CET50275445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.761940956 CET50273445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.761970997 CET50275445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:01:57.766895056 CET44550275138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:01:58.279380083 CET4455005833.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:58.279499054 CET50058445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:58.279499054 CET50058445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:58.279669046 CET50058445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:01:58.284471035 CET4455005833.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:58.284502029 CET4455005833.131.241.1192.168.2.5
                                  Jan 14, 2025 23:01:59.168421030 CET50285445192.168.2.5106.52.131.240
                                  Jan 14, 2025 23:01:59.173245907 CET44550285106.52.131.240192.168.2.5
                                  Jan 14, 2025 23:01:59.173322916 CET50285445192.168.2.5106.52.131.240
                                  Jan 14, 2025 23:01:59.173363924 CET50285445192.168.2.5106.52.131.240
                                  Jan 14, 2025 23:01:59.173439980 CET50286445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.178191900 CET44550286106.52.131.1192.168.2.5
                                  Jan 14, 2025 23:01:59.178257942 CET50286445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.178257942 CET50286445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.178287029 CET44550285106.52.131.240192.168.2.5
                                  Jan 14, 2025 23:01:59.178343058 CET50285445192.168.2.5106.52.131.240
                                  Jan 14, 2025 23:01:59.178531885 CET50287445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.183211088 CET44550286106.52.131.1192.168.2.5
                                  Jan 14, 2025 23:01:59.183273077 CET50286445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.183345079 CET44550287106.52.131.1192.168.2.5
                                  Jan 14, 2025 23:01:59.183403969 CET50287445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.183433056 CET50287445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:01:59.188293934 CET44550287106.52.131.1192.168.2.5
                                  Jan 14, 2025 23:01:59.214950085 CET50288445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:59.220072985 CET4455028855.86.227.1192.168.2.5
                                  Jan 14, 2025 23:01:59.220180988 CET50288445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:59.220221043 CET50288445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:01:59.225512981 CET4455028855.86.227.1192.168.2.5
                                  Jan 14, 2025 23:02:00.215169907 CET4455009614.88.215.1192.168.2.5
                                  Jan 14, 2025 23:02:00.215226889 CET50096445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:00.215250969 CET50096445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:00.215286970 CET50096445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:00.220097065 CET4455009614.88.215.1192.168.2.5
                                  Jan 14, 2025 23:02:00.220107079 CET4455009614.88.215.1192.168.2.5
                                  Jan 14, 2025 23:02:00.543052912 CET50298445192.168.2.580.91.35.220
                                  Jan 14, 2025 23:02:00.547940016 CET4455029880.91.35.220192.168.2.5
                                  Jan 14, 2025 23:02:00.548052073 CET50298445192.168.2.580.91.35.220
                                  Jan 14, 2025 23:02:00.548141956 CET50298445192.168.2.580.91.35.220
                                  Jan 14, 2025 23:02:00.548324108 CET50299445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.553276062 CET4455029880.91.35.220192.168.2.5
                                  Jan 14, 2025 23:02:00.553332090 CET4455029980.91.35.1192.168.2.5
                                  Jan 14, 2025 23:02:00.553353071 CET50298445192.168.2.580.91.35.220
                                  Jan 14, 2025 23:02:00.553442001 CET50299445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.554769993 CET50299445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.554994106 CET50300445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.559587955 CET4455029980.91.35.1192.168.2.5
                                  Jan 14, 2025 23:02:00.559650898 CET50299445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.559789896 CET4455030080.91.35.1192.168.2.5
                                  Jan 14, 2025 23:02:00.559845924 CET50300445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.561355114 CET50300445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:00.566225052 CET4455030080.91.35.1192.168.2.5
                                  Jan 14, 2025 23:02:01.293298006 CET50306445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:02:01.298249960 CET4455030633.131.241.1192.168.2.5
                                  Jan 14, 2025 23:02:01.298330069 CET50306445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:02:01.298348904 CET50306445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:02:01.303172112 CET4455030633.131.241.1192.168.2.5
                                  Jan 14, 2025 23:02:01.778002977 CET50312445192.168.2.5206.38.36.217
                                  Jan 14, 2025 23:02:01.783513069 CET44550312206.38.36.217192.168.2.5
                                  Jan 14, 2025 23:02:01.783718109 CET50312445192.168.2.5206.38.36.217
                                  Jan 14, 2025 23:02:01.783718109 CET50312445192.168.2.5206.38.36.217
                                  Jan 14, 2025 23:02:01.783756018 CET50313445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.789030075 CET44550313206.38.36.1192.168.2.5
                                  Jan 14, 2025 23:02:01.789072037 CET44550312206.38.36.217192.168.2.5
                                  Jan 14, 2025 23:02:01.789108038 CET50313445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.789125919 CET50313445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.789127111 CET50312445192.168.2.5206.38.36.217
                                  Jan 14, 2025 23:02:01.789346933 CET50314445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.794430971 CET44550314206.38.36.1192.168.2.5
                                  Jan 14, 2025 23:02:01.794466019 CET44550313206.38.36.1192.168.2.5
                                  Jan 14, 2025 23:02:01.794632912 CET50313445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.794764042 CET50314445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.794764042 CET50314445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:01.799640894 CET44550314206.38.36.1192.168.2.5
                                  Jan 14, 2025 23:02:02.294213057 CET44550137197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:02:02.296895981 CET50137445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:02.296895981 CET50137445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:02.296895981 CET50137445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:02.297595978 CET44550135135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:02:02.301095009 CET50135445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:02.301140070 CET50135445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:02.301177025 CET50135445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:02.302236080 CET44550137197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:02:02.302268028 CET44550137197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:02:02.306268930 CET44550135135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:02:02.306298971 CET44550135135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:02:02.500380039 CET44550140210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:02:02.502451897 CET50140445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:02:02.502500057 CET50140445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:02:02.502567053 CET50140445192.168.2.5210.238.136.1
                                  Jan 14, 2025 23:02:02.507328987 CET44550140210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:02:02.507375002 CET44550140210.238.136.1192.168.2.5
                                  Jan 14, 2025 23:02:02.559243917 CET50318445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.564742088 CET44550318210.238.136.2192.168.2.5
                                  Jan 14, 2025 23:02:02.564882994 CET50318445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.564882994 CET50318445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.565242052 CET50319445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.570400953 CET44550318210.238.136.2192.168.2.5
                                  Jan 14, 2025 23:02:02.570439100 CET44550319210.238.136.2192.168.2.5
                                  Jan 14, 2025 23:02:02.570487976 CET50318445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.570506096 CET50319445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.570543051 CET50319445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:02.575741053 CET44550319210.238.136.2192.168.2.5
                                  Jan 14, 2025 23:02:02.934223890 CET50321445192.168.2.527.239.87.188
                                  Jan 14, 2025 23:02:03.129983902 CET4455032127.239.87.188192.168.2.5
                                  Jan 14, 2025 23:02:03.130067110 CET50321445192.168.2.527.239.87.188
                                  Jan 14, 2025 23:02:03.130131006 CET50321445192.168.2.527.239.87.188
                                  Jan 14, 2025 23:02:03.130321026 CET50323445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.137274027 CET4455032327.239.87.1192.168.2.5
                                  Jan 14, 2025 23:02:03.137392044 CET50323445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.137435913 CET50323445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.137715101 CET50324445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.138839006 CET4455032127.239.87.188192.168.2.5
                                  Jan 14, 2025 23:02:03.138905048 CET50321445192.168.2.527.239.87.188
                                  Jan 14, 2025 23:02:03.142570019 CET4455032427.239.87.1192.168.2.5
                                  Jan 14, 2025 23:02:03.142659903 CET50324445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.143131018 CET4455032327.239.87.1192.168.2.5
                                  Jan 14, 2025 23:02:03.143207073 CET50323445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.145595074 CET50324445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:03.151979923 CET4455032427.239.87.1192.168.2.5
                                  Jan 14, 2025 23:02:03.232214928 CET50325445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:03.237095118 CET4455032514.88.215.1192.168.2.5
                                  Jan 14, 2025 23:02:03.237282038 CET50325445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:03.240812063 CET50325445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:03.245841980 CET4455032514.88.215.1192.168.2.5
                                  Jan 14, 2025 23:02:04.012384892 CET50330445192.168.2.524.33.186.66
                                  Jan 14, 2025 23:02:04.017688990 CET4455033024.33.186.66192.168.2.5
                                  Jan 14, 2025 23:02:04.017816067 CET50330445192.168.2.524.33.186.66
                                  Jan 14, 2025 23:02:04.017910004 CET50331445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.017910004 CET50330445192.168.2.524.33.186.66
                                  Jan 14, 2025 23:02:04.022975922 CET4455033124.33.186.1192.168.2.5
                                  Jan 14, 2025 23:02:04.023061037 CET50331445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.023061037 CET4455033024.33.186.66192.168.2.5
                                  Jan 14, 2025 23:02:04.023082018 CET50331445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.023128033 CET50330445192.168.2.524.33.186.66
                                  Jan 14, 2025 23:02:04.023467064 CET50332445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.028605938 CET4455033224.33.186.1192.168.2.5
                                  Jan 14, 2025 23:02:04.028692007 CET50332445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.028700113 CET50332445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.028701067 CET4455033124.33.186.1192.168.2.5
                                  Jan 14, 2025 23:02:04.028753996 CET50331445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:04.033521891 CET4455033224.33.186.1192.168.2.5
                                  Jan 14, 2025 23:02:04.262927055 CET44550158175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:02:04.263006926 CET50158445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:04.263111115 CET50158445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:04.263111115 CET50158445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:04.268501043 CET44550158175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:02:04.268548012 CET44550158175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:02:05.027968884 CET50339445192.168.2.5165.165.9.166
                                  Jan 14, 2025 23:02:05.032816887 CET44550339165.165.9.166192.168.2.5
                                  Jan 14, 2025 23:02:05.032910109 CET50339445192.168.2.5165.165.9.166
                                  Jan 14, 2025 23:02:05.032938004 CET50339445192.168.2.5165.165.9.166
                                  Jan 14, 2025 23:02:05.033067942 CET50340445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.037940979 CET44550340165.165.9.1192.168.2.5
                                  Jan 14, 2025 23:02:05.037996054 CET44550339165.165.9.166192.168.2.5
                                  Jan 14, 2025 23:02:05.038026094 CET50340445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.038026094 CET50340445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.038045883 CET50339445192.168.2.5165.165.9.166
                                  Jan 14, 2025 23:02:05.038301945 CET50341445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.043066978 CET44550340165.165.9.1192.168.2.5
                                  Jan 14, 2025 23:02:05.043137074 CET50340445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.043181896 CET44550341165.165.9.1192.168.2.5
                                  Jan 14, 2025 23:02:05.043241024 CET50341445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.043272018 CET50341445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:05.048181057 CET44550341165.165.9.1192.168.2.5
                                  Jan 14, 2025 23:02:05.309241056 CET50345445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:05.309277058 CET50344445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:05.314167023 CET44550345135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:02:05.314227104 CET44550344197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:02:05.314270020 CET50345445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:05.314270020 CET50345445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:05.314287901 CET50344445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:05.314321995 CET50344445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:05.319128036 CET44550345135.45.113.1192.168.2.5
                                  Jan 14, 2025 23:02:05.319231033 CET44550344197.4.5.3192.168.2.5
                                  Jan 14, 2025 23:02:05.965946913 CET50348445192.168.2.533.175.236.126
                                  Jan 14, 2025 23:02:05.970763922 CET4455034833.175.236.126192.168.2.5
                                  Jan 14, 2025 23:02:05.970844984 CET50348445192.168.2.533.175.236.126
                                  Jan 14, 2025 23:02:05.970870972 CET50348445192.168.2.533.175.236.126
                                  Jan 14, 2025 23:02:05.971048117 CET50349445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.975820065 CET4455034933.175.236.1192.168.2.5
                                  Jan 14, 2025 23:02:05.975835085 CET4455034833.175.236.126192.168.2.5
                                  Jan 14, 2025 23:02:05.975879908 CET50349445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.975908995 CET50348445192.168.2.533.175.236.126
                                  Jan 14, 2025 23:02:05.976021051 CET50349445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.976332903 CET50350445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.980885983 CET4455034933.175.236.1192.168.2.5
                                  Jan 14, 2025 23:02:05.980940104 CET50349445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.981112957 CET4455035033.175.236.1192.168.2.5
                                  Jan 14, 2025 23:02:05.981175900 CET50350445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.981215954 CET50350445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:05.985986948 CET4455035033.175.236.1192.168.2.5
                                  Jan 14, 2025 23:02:06.295495987 CET44550173170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:02:06.295615911 CET50173445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:06.295790911 CET50173445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:06.295790911 CET50173445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:06.300592899 CET44550173170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:02:06.300610065 CET44550173170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:02:06.840660095 CET50351445192.168.2.5199.47.119.29
                                  Jan 14, 2025 23:02:06.845467091 CET44550351199.47.119.29192.168.2.5
                                  Jan 14, 2025 23:02:06.845609903 CET50351445192.168.2.5199.47.119.29
                                  Jan 14, 2025 23:02:06.845630884 CET50351445192.168.2.5199.47.119.29
                                  Jan 14, 2025 23:02:06.845777988 CET50352445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.850557089 CET44550352199.47.119.1192.168.2.5
                                  Jan 14, 2025 23:02:06.850647926 CET50352445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.850666046 CET50352445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.851088047 CET50353445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.851181030 CET44550351199.47.119.29192.168.2.5
                                  Jan 14, 2025 23:02:06.851236105 CET50351445192.168.2.5199.47.119.29
                                  Jan 14, 2025 23:02:06.855609894 CET44550352199.47.119.1192.168.2.5
                                  Jan 14, 2025 23:02:06.855689049 CET50352445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.855870962 CET44550353199.47.119.1192.168.2.5
                                  Jan 14, 2025 23:02:06.855925083 CET50353445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.855945110 CET50353445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:06.860723019 CET44550353199.47.119.1192.168.2.5
                                  Jan 14, 2025 23:02:07.277991056 CET50354445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:07.282803059 CET44550354175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:02:07.282926083 CET50354445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:07.282974005 CET50354445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:07.287710905 CET44550354175.107.76.1192.168.2.5
                                  Jan 14, 2025 23:02:07.619756937 CET44550181131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:02:07.619885921 CET50181445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:02:07.619976997 CET50181445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:02:07.619976997 CET50181445192.168.2.5131.73.187.1
                                  Jan 14, 2025 23:02:07.625016928 CET44550181131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:02:07.625063896 CET44550181131.73.187.1192.168.2.5
                                  Jan 14, 2025 23:02:07.668757915 CET50355445192.168.2.554.252.124.47
                                  Jan 14, 2025 23:02:07.673793077 CET4455035554.252.124.47192.168.2.5
                                  Jan 14, 2025 23:02:07.673897982 CET50355445192.168.2.554.252.124.47
                                  Jan 14, 2025 23:02:07.673969984 CET50355445192.168.2.554.252.124.47
                                  Jan 14, 2025 23:02:07.674144983 CET50356445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.678886890 CET4455035554.252.124.47192.168.2.5
                                  Jan 14, 2025 23:02:07.678947926 CET50355445192.168.2.554.252.124.47
                                  Jan 14, 2025 23:02:07.679086924 CET4455035654.252.124.1192.168.2.5
                                  Jan 14, 2025 23:02:07.679158926 CET50356445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.679290056 CET50356445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.679670095 CET50357445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.684402943 CET4455035654.252.124.1192.168.2.5
                                  Jan 14, 2025 23:02:07.684478045 CET50356445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.684566975 CET50358445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.684631109 CET4455035754.252.124.1192.168.2.5
                                  Jan 14, 2025 23:02:07.684714079 CET50357445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.684714079 CET50357445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:07.689425945 CET44550358131.73.187.2192.168.2.5
                                  Jan 14, 2025 23:02:07.689496994 CET50358445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.689562082 CET50358445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.689711094 CET4455035754.252.124.1192.168.2.5
                                  Jan 14, 2025 23:02:07.690022945 CET50359445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.694549084 CET44550358131.73.187.2192.168.2.5
                                  Jan 14, 2025 23:02:07.694607973 CET50358445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.694842100 CET44550359131.73.187.2192.168.2.5
                                  Jan 14, 2025 23:02:07.694960117 CET50359445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.694982052 CET50359445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:07.699843884 CET44550359131.73.187.2192.168.2.5
                                  Jan 14, 2025 23:02:08.314768076 CET44550188192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:02:08.314963102 CET50188445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:08.314963102 CET50188445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:08.314964056 CET50188445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:08.320983887 CET44550188192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:02:08.321019888 CET44550188192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:02:08.434298992 CET50360445192.168.2.596.221.78.64
                                  Jan 14, 2025 23:02:08.439271927 CET4455036096.221.78.64192.168.2.5
                                  Jan 14, 2025 23:02:08.439536095 CET50360445192.168.2.596.221.78.64
                                  Jan 14, 2025 23:02:08.439537048 CET50360445192.168.2.596.221.78.64
                                  Jan 14, 2025 23:02:08.439703941 CET50361445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.444473982 CET4455036196.221.78.1192.168.2.5
                                  Jan 14, 2025 23:02:08.444550037 CET50361445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.444586039 CET50361445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.444650888 CET4455036096.221.78.64192.168.2.5
                                  Jan 14, 2025 23:02:08.444787025 CET50362445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.444835901 CET50360445192.168.2.596.221.78.64
                                  Jan 14, 2025 23:02:08.449511051 CET4455036196.221.78.1192.168.2.5
                                  Jan 14, 2025 23:02:08.449635029 CET50361445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.449636936 CET4455036296.221.78.1192.168.2.5
                                  Jan 14, 2025 23:02:08.449712038 CET50362445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.449745893 CET50362445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:08.454550982 CET4455036296.221.78.1192.168.2.5
                                  Jan 14, 2025 23:02:08.498692989 CET44550190200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:02:08.498761892 CET50190445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:02:08.498800993 CET50190445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:02:08.498847008 CET50190445192.168.2.5200.56.125.1
                                  Jan 14, 2025 23:02:08.503668070 CET44550190200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:02:08.503696918 CET44550190200.56.125.1192.168.2.5
                                  Jan 14, 2025 23:02:08.559032917 CET50363445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.563858986 CET44550363200.56.125.2192.168.2.5
                                  Jan 14, 2025 23:02:08.563950062 CET50363445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.563961983 CET50363445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.564202070 CET50364445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.569134951 CET44550364200.56.125.2192.168.2.5
                                  Jan 14, 2025 23:02:08.569166899 CET44550363200.56.125.2192.168.2.5
                                  Jan 14, 2025 23:02:08.569196939 CET50364445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.569216013 CET50363445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.569281101 CET50364445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:08.574090958 CET44550364200.56.125.2192.168.2.5
                                  Jan 14, 2025 23:02:09.309303045 CET50366445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:09.314318895 CET44550366170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:02:09.314488888 CET50366445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:09.314488888 CET50366445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:09.319377899 CET44550366170.188.75.1192.168.2.5
                                  Jan 14, 2025 23:02:10.311486006 CET4455020131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:02:10.311697960 CET50201445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:10.311697960 CET50201445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:10.311697960 CET50201445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:10.316621065 CET4455020131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:02:10.316776037 CET4455020131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:02:10.532128096 CET4455020433.35.197.1192.168.2.5
                                  Jan 14, 2025 23:02:10.532320976 CET50204445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:02:10.532320976 CET50204445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:02:10.532736063 CET50204445192.168.2.533.35.197.1
                                  Jan 14, 2025 23:02:10.537192106 CET4455020433.35.197.1192.168.2.5
                                  Jan 14, 2025 23:02:10.537542105 CET4455020433.35.197.1192.168.2.5
                                  Jan 14, 2025 23:02:10.592632055 CET50370445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:10.597531080 CET4455037033.35.197.2192.168.2.5
                                  Jan 14, 2025 23:02:10.597623110 CET50370445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:10.597647905 CET50370445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:10.597942114 CET50371445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:10.602721930 CET4455037133.35.197.2192.168.2.5
                                  Jan 14, 2025 23:02:10.602799892 CET50371445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:10.602826118 CET50371445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:10.606347084 CET4455037033.35.197.2192.168.2.5
                                  Jan 14, 2025 23:02:10.607714891 CET4455037133.35.197.2192.168.2.5
                                  Jan 14, 2025 23:02:10.622792006 CET4455037033.35.197.2192.168.2.5
                                  Jan 14, 2025 23:02:10.622853994 CET50370445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:11.093020916 CET4455020866.125.28.2192.168.2.5
                                  Jan 14, 2025 23:02:11.093125105 CET50208445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:02:11.093169928 CET50208445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:02:11.093216896 CET50208445192.168.2.566.125.28.2
                                  Jan 14, 2025 23:02:11.097980022 CET4455020866.125.28.2192.168.2.5
                                  Jan 14, 2025 23:02:11.097995996 CET4455020866.125.28.2192.168.2.5
                                  Jan 14, 2025 23:02:11.153593063 CET50374445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.158890009 CET4455037466.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:11.158987045 CET50374445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.159029007 CET50374445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.159296036 CET50375445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.164318085 CET4455037466.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:11.164352894 CET4455037566.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:11.164391994 CET50374445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.164427996 CET50375445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.164444923 CET50375445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:11.170720100 CET4455037566.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:11.324949026 CET50376445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:11.329992056 CET44550376192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:02:11.330061913 CET50376445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:11.330080986 CET50376445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:11.334954977 CET44550376192.117.193.1192.168.2.5
                                  Jan 14, 2025 23:02:12.340411901 CET44550219124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:02:12.340491056 CET50219445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:12.355552912 CET50219445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:12.358521938 CET50219445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:12.360327959 CET44550219124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:02:12.363318920 CET44550219124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:02:12.787226915 CET4455037566.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:12.787425995 CET50375445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:12.787425995 CET50375445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:12.787425995 CET50375445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:12.793422937 CET4455037566.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:12.793432951 CET4455037566.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:13.324856043 CET50391445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:13.329746008 CET4455039131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:02:13.329900026 CET50391445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:13.329916000 CET50391445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:13.334650993 CET4455039131.38.176.1192.168.2.5
                                  Jan 14, 2025 23:02:14.233378887 CET44550233155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:02:14.233594894 CET50233445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:14.233594894 CET50233445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:14.233594894 CET50233445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:14.238570929 CET44550233155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:02:14.238600969 CET44550233155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:02:14.809694052 CET44550237192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:02:14.809799910 CET50237445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:02:14.809993029 CET50237445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:02:14.809993029 CET50237445192.168.2.5192.75.238.1
                                  Jan 14, 2025 23:02:14.814831018 CET44550237192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:02:14.814861059 CET44550237192.75.238.1192.168.2.5
                                  Jan 14, 2025 23:02:15.088428974 CET50410445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.093559980 CET44550410192.75.238.2192.168.2.5
                                  Jan 14, 2025 23:02:15.093643904 CET50410445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.093712091 CET50410445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.094145060 CET50412445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.098737001 CET44550410192.75.238.2192.168.2.5
                                  Jan 14, 2025 23:02:15.098799944 CET50410445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.099088907 CET44550412192.75.238.2192.168.2.5
                                  Jan 14, 2025 23:02:15.099147081 CET50412445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.099167109 CET50412445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:15.103965998 CET44550412192.75.238.2192.168.2.5
                                  Jan 14, 2025 23:02:15.371850967 CET50415445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:15.376750946 CET44550415124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:02:15.376826048 CET50415445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:15.376861095 CET50415445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:15.382142067 CET44550415124.128.75.1192.168.2.5
                                  Jan 14, 2025 23:02:15.793844938 CET50423445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:15.798825026 CET4455042366.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:15.798957109 CET50423445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:15.798998117 CET50423445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:15.803858042 CET4455042366.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:16.003489971 CET44550248206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:02:16.003611088 CET50248445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:02:16.003612041 CET50248445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:02:16.003684998 CET50248445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:02:16.012670994 CET44550248206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:02:16.012702942 CET44550248206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:02:16.596895933 CET4455025345.211.236.1192.168.2.5
                                  Jan 14, 2025 23:02:16.598701954 CET50253445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:02:16.598756075 CET50253445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:02:16.598757029 CET50253445192.168.2.545.211.236.1
                                  Jan 14, 2025 23:02:16.603573084 CET4455025345.211.236.1192.168.2.5
                                  Jan 14, 2025 23:02:16.603602886 CET4455025345.211.236.1192.168.2.5
                                  Jan 14, 2025 23:02:16.653251886 CET50440445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.658081055 CET4455044045.211.236.2192.168.2.5
                                  Jan 14, 2025 23:02:16.658163071 CET50440445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.658252954 CET50440445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.658521891 CET50441445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.663208008 CET4455044045.211.236.2192.168.2.5
                                  Jan 14, 2025 23:02:16.663336039 CET50440445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.663382053 CET4455044145.211.236.2192.168.2.5
                                  Jan 14, 2025 23:02:16.663455963 CET50441445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.663500071 CET50441445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:16.668335915 CET4455044145.211.236.2192.168.2.5
                                  Jan 14, 2025 23:02:17.246769905 CET50454445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:17.251573086 CET44550454155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:02:17.251662970 CET50454445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:17.251694918 CET50454445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:17.256576061 CET44550454155.32.24.1192.168.2.5
                                  Jan 14, 2025 23:02:17.434156895 CET4455042366.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:17.434288025 CET50423445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:17.434387922 CET50423445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:17.434387922 CET50423445192.168.2.566.125.28.3
                                  Jan 14, 2025 23:02:17.439266920 CET4455042366.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:17.439482927 CET4455042366.125.28.3192.168.2.5
                                  Jan 14, 2025 23:02:17.496972084 CET50459445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.501733065 CET4455045966.125.28.4192.168.2.5
                                  Jan 14, 2025 23:02:17.501847982 CET50459445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.501858950 CET50459445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.502161980 CET50460445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.506767988 CET4455045966.125.28.4192.168.2.5
                                  Jan 14, 2025 23:02:17.506820917 CET50459445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.506891012 CET4455046066.125.28.4192.168.2.5
                                  Jan 14, 2025 23:02:17.506947994 CET50460445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.506973028 CET50460445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:17.511750937 CET4455046066.125.28.4192.168.2.5
                                  Jan 14, 2025 23:02:17.626159906 CET4455026327.102.118.1192.168.2.5
                                  Jan 14, 2025 23:02:17.626214027 CET50263445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:02:17.626244068 CET50263445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:02:17.626267910 CET50263445192.168.2.527.102.118.1
                                  Jan 14, 2025 23:02:17.631022930 CET4455026327.102.118.1192.168.2.5
                                  Jan 14, 2025 23:02:17.631098986 CET4455026327.102.118.1192.168.2.5
                                  Jan 14, 2025 23:02:18.560662985 CET44550270178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:02:18.560781002 CET50270445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:02:18.560781002 CET50270445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:02:18.560868979 CET50270445192.168.2.5178.11.135.1
                                  Jan 14, 2025 23:02:18.565702915 CET44550270178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:02:18.565711021 CET44550270178.11.135.1192.168.2.5
                                  Jan 14, 2025 23:02:18.621917009 CET50494445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.626899004 CET44550494178.11.135.2192.168.2.5
                                  Jan 14, 2025 23:02:18.626993895 CET50494445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.627037048 CET50494445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.627330065 CET50495445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.632184029 CET44550495178.11.135.2192.168.2.5
                                  Jan 14, 2025 23:02:18.632268906 CET50495445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.632307053 CET50495445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.632472992 CET44550494178.11.135.2192.168.2.5
                                  Jan 14, 2025 23:02:18.632539988 CET50494445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:18.637093067 CET44550495178.11.135.2192.168.2.5
                                  Jan 14, 2025 23:02:19.012402058 CET50515445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:02:19.017283916 CET44550515206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:02:19.017380953 CET50515445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:02:19.017402887 CET50515445192.168.2.5206.34.209.1
                                  Jan 14, 2025 23:02:19.022280931 CET44550515206.34.209.1192.168.2.5
                                  Jan 14, 2025 23:02:19.124150038 CET44550275138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:02:19.124278069 CET50275445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:02:19.124313116 CET50275445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:02:19.124355078 CET50275445192.168.2.5138.229.112.1
                                  Jan 14, 2025 23:02:19.129143953 CET44550275138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:02:19.129163027 CET44550275138.229.112.1192.168.2.5
                                  Jan 14, 2025 23:02:20.546056032 CET44550287106.52.131.1192.168.2.5
                                  Jan 14, 2025 23:02:20.546122074 CET50287445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:02:20.620620966 CET4455028855.86.227.1192.168.2.5
                                  Jan 14, 2025 23:02:20.620683908 CET50288445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:02:21.189734936 CET50391445192.168.2.531.38.176.1
                                  Jan 14, 2025 23:02:21.189774036 CET50319445192.168.2.5210.238.136.2
                                  Jan 14, 2025 23:02:21.189816952 CET50353445192.168.2.5199.47.119.1
                                  Jan 14, 2025 23:02:21.189837933 CET50364445192.168.2.5200.56.125.2
                                  Jan 14, 2025 23:02:21.189868927 CET50350445192.168.2.533.175.236.1
                                  Jan 14, 2025 23:02:21.189904928 CET50345445192.168.2.5135.45.113.1
                                  Jan 14, 2025 23:02:21.189949036 CET50341445192.168.2.5165.165.9.1
                                  Jan 14, 2025 23:02:21.189984083 CET50371445192.168.2.533.35.197.2
                                  Jan 14, 2025 23:02:21.190016031 CET50332445192.168.2.524.33.186.1
                                  Jan 14, 2025 23:02:21.190048933 CET50306445192.168.2.533.131.241.1
                                  Jan 14, 2025 23:02:21.190057993 CET50344445192.168.2.5197.4.5.3
                                  Jan 14, 2025 23:02:21.190092087 CET50287445192.168.2.5106.52.131.1
                                  Jan 14, 2025 23:02:21.190129042 CET50376445192.168.2.5192.117.193.1
                                  Jan 14, 2025 23:02:21.190175056 CET50495445192.168.2.5178.11.135.2
                                  Jan 14, 2025 23:02:21.190196991 CET50288445192.168.2.555.86.227.1
                                  Jan 14, 2025 23:02:21.190223932 CET50300445192.168.2.580.91.35.1
                                  Jan 14, 2025 23:02:21.190249920 CET50314445192.168.2.5206.38.36.1
                                  Jan 14, 2025 23:02:21.190268993 CET50324445192.168.2.527.239.87.1
                                  Jan 14, 2025 23:02:21.190303087 CET50325445192.168.2.514.88.215.1
                                  Jan 14, 2025 23:02:21.190391064 CET50357445192.168.2.554.252.124.1
                                  Jan 14, 2025 23:02:21.190397024 CET50354445192.168.2.5175.107.76.1
                                  Jan 14, 2025 23:02:21.190411091 CET50359445192.168.2.5131.73.187.2
                                  Jan 14, 2025 23:02:21.190438986 CET50362445192.168.2.596.221.78.1
                                  Jan 14, 2025 23:02:21.190465927 CET50366445192.168.2.5170.188.75.1
                                  Jan 14, 2025 23:02:21.190485001 CET50415445192.168.2.5124.128.75.1
                                  Jan 14, 2025 23:02:21.190506935 CET50412445192.168.2.5192.75.238.2
                                  Jan 14, 2025 23:02:21.190548897 CET50441445192.168.2.545.211.236.2
                                  Jan 14, 2025 23:02:21.190568924 CET50454445192.168.2.5155.32.24.1
                                  Jan 14, 2025 23:02:21.190599918 CET50460445192.168.2.566.125.28.4
                                  Jan 14, 2025 23:02:21.190752983 CET50515445192.168.2.5206.34.209.1
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 14, 2025 23:01:13.372632027 CET5761953192.168.2.51.1.1.1
                                  Jan 14, 2025 23:01:13.673958063 CET53576191.1.1.1192.168.2.5
                                  Jan 14, 2025 23:01:14.302748919 CET5708653192.168.2.51.1.1.1
                                  Jan 14, 2025 23:01:14.635179043 CET53570861.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 14, 2025 23:01:13.372632027 CET192.168.2.51.1.1.10x8ffStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                  Jan 14, 2025 23:01:14.302748919 CET192.168.2.51.1.1.10x1998Standard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 14, 2025 23:01:13.673958063 CET1.1.1.1192.168.2.50x8ffNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                  Jan 14, 2025 23:01:14.635179043 CET1.1.1.1192.168.2.50x1998No error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                  Jan 14, 2025 23:01:14.635179043 CET1.1.1.1192.168.2.50x1998No error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                  • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549705103.224.212.215801856C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 23:01:13.686799049 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Cache-Control: no-cache
                                  Jan 14, 2025 23:01:14.297621012 CET365INHTTP/1.1 302 Found
                                  date: Tue, 14 Jan 2025 22:01:14 GMT
                                  server: Apache
                                  set-cookie: __tad=1736892074.7770901; expires=Fri, 12-Jan-2035 22:01:14 GMT; Max-Age=315360000
                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-14d8-ae64-02e71c751956
                                  content-length: 2
                                  content-type: text/html; charset=UTF-8
                                  connection: close
                                  Data Raw: 0a 0a
                                  Data Ascii:


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549706199.59.243.228801856C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 23:01:14.693592072 CET169OUTGET /?subid1=20250115-0901-14d8-ae64-02e71c751956 HTTP/1.1
                                  Cache-Control: no-cache
                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Connection: Keep-Alive
                                  Jan 14, 2025 23:01:15.147213936 CET1236INHTTP/1.1 200 OK
                                  date: Tue, 14 Jan 2025 22:01:14 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1262
                                  x-request-id: 4d94cd22-7172-4f4b-ac4b-b562938e91cd
                                  cache-control: no-store, max-age=0
                                  accept-ch: sec-ch-prefers-color-scheme
                                  critical-ch: sec-ch-prefers-color-scheme
                                  vary: sec-ch-prefers-color-scheme
                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_fmDkl1micUtHf1h2TPGUCd9++v5k8A3EIS4g9OyvZEtMlVWgJ5GbfBSE8oLhseZElbRsJY5iKDG3VxleMvkWeA==
                                  set-cookie: parking_session=4d94cd22-7172-4f4b-ac4b-b562938e91cd; expires=Tue, 14 Jan 2025 22:16:15 GMT; path=/
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 66 6d 44 6b 6c 31 6d 69 63 55 74 48 66 31 68 32 54 50 47 55 43 64 39 2b 2b 76 35 6b 38 41 33 45 49 53 34 67 39 4f 79 76 5a 45 74 4d 6c 56 57 67 4a 35 47 62 66 42 53 45 38 6f 4c 68 73 65 5a 45 6c 62 52 73 4a 59 35 69 4b 44 47 33 56 78 6c 65 4d 76 6b 57 65 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_fmDkl1micUtHf1h2TPGUCd9++v5k8A3EIS4g9OyvZEtMlVWgJ5GbfBSE8oLhseZElbRsJY5iKDG3VxleMvkWeA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                  Jan 14, 2025 23:01:15.147239923 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                  Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNGQ5NGNkMjItNzE3Mi00ZjRiLWFjNGItYjU2MjkzOGU5MWNkIiwicGFnZV90aW1lIjoxNzM2ODkyMDc1LCJwYWdlX3VybCI6I


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.549707103.224.212.215806448C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 23:01:15.565308094 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Cache-Control: no-cache
                                  Jan 14, 2025 23:01:16.150002003 CET365INHTTP/1.1 302 Found
                                  date: Tue, 14 Jan 2025 22:01:16 GMT
                                  server: Apache
                                  set-cookie: __tad=1736892076.6256118; expires=Fri, 12-Jan-2035 22:01:16 GMT; Max-Age=315360000
                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1669-a0d3-4edd9cd30f7f
                                  content-length: 2
                                  content-type: text/html; charset=UTF-8
                                  connection: close
                                  Data Raw: 0a 0a
                                  Data Ascii:


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.549708103.224.212.215804308C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 23:01:16.165612936 CET134OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Cache-Control: no-cache
                                  Cookie: __tad=1736892074.7770901
                                  Jan 14, 2025 23:01:16.813292980 CET269INHTTP/1.1 302 Found
                                  date: Tue, 14 Jan 2025 22:01:16 GMT
                                  server: Apache
                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-1690-be53-cf6353b68d38
                                  content-length: 2
                                  content-type: text/html; charset=UTF-8
                                  connection: close
                                  Data Raw: 0a 0a
                                  Data Ascii:


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.549709199.59.243.228806448C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 23:01:16.166739941 CET169OUTGET /?subid1=20250115-0901-1669-a0d3-4edd9cd30f7f HTTP/1.1
                                  Cache-Control: no-cache
                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Connection: Keep-Alive
                                  Jan 14, 2025 23:01:16.636703968 CET1236INHTTP/1.1 200 OK
                                  date: Tue, 14 Jan 2025 22:01:15 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1262
                                  x-request-id: 2b1c7d15-64e4-403c-960e-14ef7a2518e1
                                  cache-control: no-store, max-age=0
                                  accept-ch: sec-ch-prefers-color-scheme
                                  critical-ch: sec-ch-prefers-color-scheme
                                  vary: sec-ch-prefers-color-scheme
                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_VmvFZPqzq7VveYk3xHXar9k3KK4qma5/1QzouPHYF8Q4GkjKbGEQQqEoVH5S7TFMlolJZJcmXf3A94y03SErtQ==
                                  set-cookie: parking_session=2b1c7d15-64e4-403c-960e-14ef7a2518e1; expires=Tue, 14 Jan 2025 22:16:16 GMT; path=/
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 56 6d 76 46 5a 50 71 7a 71 37 56 76 65 59 6b 33 78 48 58 61 72 39 6b 33 4b 4b 34 71 6d 61 35 2f 31 51 7a 6f 75 50 48 59 46 38 51 34 47 6b 6a 4b 62 47 45 51 51 71 45 6f 56 48 35 53 37 54 46 4d 6c 6f 6c 4a 5a 4a 63 6d 58 66 33 41 39 34 79 30 33 53 45 72 74 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_VmvFZPqzq7VveYk3xHXar9k3KK4qma5/1QzouPHYF8Q4GkjKbGEQQqEoVH5S7TFMlolJZJcmXf3A94y03SErtQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                  Jan 14, 2025 23:01:16.636728048 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                  Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMmIxYzdkMTUtNjRlNC00MDNjLTk2MGUtMTRlZjdhMjUxOGUxIiwicGFnZV90aW1lIjoxNzM2ODkyMDc2LCJwYWdlX3VybCI6I


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.549716199.59.243.228804308C:\Windows\mssecsvr.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 14, 2025 23:01:16.826224089 CET231OUTGET /?subid1=20250115-0901-1690-be53-cf6353b68d38 HTTP/1.1
                                  Cache-Control: no-cache
                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                  Connection: Keep-Alive
                                  Cookie: parking_session=4d94cd22-7172-4f4b-ac4b-b562938e91cd
                                  Jan 14, 2025 23:01:17.306843042 CET1236INHTTP/1.1 200 OK
                                  date: Tue, 14 Jan 2025 22:01:16 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1262
                                  x-request-id: 0f3f2500-3968-40b2-bf76-9bda12e1951a
                                  cache-control: no-store, max-age=0
                                  accept-ch: sec-ch-prefers-color-scheme
                                  critical-ch: sec-ch-prefers-color-scheme
                                  vary: sec-ch-prefers-color-scheme
                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_G6X7Xgxlmtr1/YyeEI9UVXlp1c8F8BKDPZ2Bxa3FlSuj1dOrYft3PAaWm21Z7hAzLQrvvIEyzeb5tZ1u2I47GQ==
                                  set-cookie: parking_session=4d94cd22-7172-4f4b-ac4b-b562938e91cd; expires=Tue, 14 Jan 2025 22:16:17 GMT
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 47 36 58 37 58 67 78 6c 6d 74 72 31 2f 59 79 65 45 49 39 55 56 58 6c 70 31 63 38 46 38 42 4b 44 50 5a 32 42 78 61 33 46 6c 53 75 6a 31 64 4f 72 59 66 74 33 50 41 61 57 6d 32 31 5a 37 68 41 7a 4c 51 72 76 76 49 45 79 7a 65 62 35 74 5a 31 75 32 49 34 37 47 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_G6X7Xgxlmtr1/YyeEI9UVXlp1c8F8BKDPZ2Bxa3FlSuj1dOrYft3PAaWm21Z7hAzLQrvvIEyzeb5tZ1u2I47GQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                  Jan 14, 2025 23:01:17.306930065 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                  Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNGQ5NGNkMjItNzE3Mi00ZjRiLWFjNGItYjU2MjkzOGU5MWNkIiwicGFnZV90aW1lIjoxNzM2ODkyMDc3LCJwYWdlX3VybCI6Imh0dHA6L


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:17:01:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll"
                                  Imagebase:0xc00000
                                  File size:126'464 bytes
                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:1
                                  Start time:17:01:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:17:01:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:17:01:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\F1G5BkUV74.dll,PlayGame
                                  Imagebase:0xed0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:17:01:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",#1
                                  Imagebase:0xed0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:17:01:12
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvr.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvr.exe
                                  Imagebase:0x400000
                                  File size:2'281'472 bytes
                                  MD5 hash:B6FB8BD123BD0C46CC1A17A2775569B5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2138325687.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2138475485.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2138475485.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:7
                                  Start time:17:01:14
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvr.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                  Imagebase:0x400000
                                  File size:2'281'472 bytes
                                  MD5 hash:B6FB8BD123BD0C46CC1A17A2775569B5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2159921750.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2160091492.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.2160091492.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2811407590.0000000001D61000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2811407590.0000000001D61000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2811667868.0000000002289000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2811667868.0000000002289000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:17:01:15
                                  Start date:14/01/2025
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\F1G5BkUV74.dll",PlayGame
                                  Imagebase:0xed0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:9
                                  Start time:17:01:15
                                  Start date:14/01/2025
                                  Path:C:\Windows\mssecsvr.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\WINDOWS\mssecsvr.exe
                                  Imagebase:0x400000
                                  File size:2'281'472 bytes
                                  MD5 hash:B6FB8BD123BD0C46CC1A17A2775569B5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.2180600297.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.2166423022.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.2180869415.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.2180869415.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.2166574192.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.2166574192.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:71.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:63.2%
                                    Total number of Nodes:38
                                    Total number of Limit Nodes:9
                                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                    • CreateProcessA.KERNELBASE ref: 00407EE8
                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2173615196.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2173598319.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173635545.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173694782.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4281112323-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2173615196.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2173598319.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173635545.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173694782.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2173615196.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2173598319.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173635545.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173694782.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    • API String ID: 774561529-2614457033
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2173615196.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2173598319.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173635545.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173694782.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                    • API String ID: 3340711343-2450984573
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2173615196.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000006.00000002.2173598319.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173635545.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173651265.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173694782.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000006.00000002.2173785184.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.1
                                    • API String ID: 4274534310-2839763450
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Execution Graph

                                    Execution Coverage:34.8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:36
                                    Total number of Limit Nodes:2

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2810190714.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000007.00000002.2810158904.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810206038.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810272136.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810286991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.1
                                    • API String ID: 4274534310-2839763450
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2810190714.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000007.00000002.2810158904.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810206038.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810272136.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810286991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    • API String ID: 774561529-2614457033
                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2810190714.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000007.00000002.2810158904.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810206038.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810272136.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810286991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                    • API String ID: 3340711343-2450984573
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2810190714.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000007.00000002.2810158904.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810206038.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810272136.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810286991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4072214828-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2810190714.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000007.00000002.2810158904.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810206038.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810219864.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810257698.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810272136.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810286991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000007.00000002.2810402637.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59